News Go

News & articles

A new Bluetooth exploit leaves billions at risk. Is your device vulnerable?

Update #2 (9/14): Google has taken the first step to plug the massive Bluetooth vulnerability that is said to affect around two billion Android devices. A fix for BlueBorne has been included in the September security update, which is currently going out to devices from Google and other manufacturers. The update patches four of the vulnerabilities reported by Armis Labs, including two that were deemed critical by Google (via 9to5Google).

The patch has been made available to Android OEMs, but this is where Android’s biggest weakness becomes apparent once again. It could take months for the patch to reach many Android devices, and that’s the fortunate case. The hundreds of millions of phones that no longer (or never have) receive Android updates will remain vulnerable.


Update (9/13): Armis Security has released an official app that will tell you if any Bluetooth devices around you are vulnerable to BlueBorne. It’s a free app, and super easy to use. Just install it via the Play Store link below, tap the check button, and it will automatically scan for vulnerable Bluetooth devices around you.

Original post (9/12): According to a new report, roughly 5.3 billion of the 8.2 billion Bluetooth connected devices on the planet are vulnerable to a new exploit. Nearly every connected device on earth features Bluetooth and now over half of them are at risk from BlueBorne, a new zero-day exploit. BlueBorne targets vulnerable devices and spreads without the action or knowledge of the user. It’s being compared to the nasty WannaCry ransomware that spread around the globe earlier this year.

Here’s how it works: BlueBorne infects your device silently. Without any action on your part, it spreads to your device by taking advantage of how Bluetooth uses tethering to share data. It then acts as a trusted network and allows hackers to execute “man in the middle” attacks without you even knowing it. From there, it spreads to other vulnerable devices it detects….

Read the full article from the Source…

Back to Top