New Bluetooth vulnerability allows to hack iPhone in 10 seconds

Photo: AmericaRU.com

A cyber security company Armis discovered a series of 8 vulnerabilities, which he called BlueBorne. These errors can allow an attacker to access your iPhone without touching it.

“These vulnerabilities are fully functional and can be used successfully, as shown in our studies. Vector BlueBorne can be used for a large number of hacks, including remote code and other”, – said in a statement.

“BlueBorne affects almost all devices that we use, including the iPhone. Experts have posted videos, which shows how the vulnerability can allow hackers to identify the device, connect to it via Bluetooth, and then start to control the screen and applications. However, the owner can detect hacking because the screen “alive”.

The next step is a set of commands that allows you to control the device. “The vulnerability is in the service of the Bluetooth Protocol (BNEP), and it allows you to use the Internet via the Bluetooth connection due to lack of service BNEP hacker can cause corruption of RAM, which is easy to use and get full control over the device,” write the researchers. When the hacker has access, he can start to transfer personal data.

Leave a comment

´╗┐Confirm that you are not a bot - select a man with raised hand: