How to hack and control your phone through Bluetooth, and how to protect yourself?


Last week, we published a warning article about a new loophole in the Bluetooth protocol through which the Internet is shared over the phone. This vulnerability allows the hacker to take complete control of a secret shell on almost any device that uses this wireless interface.

Since Bluetooth is the most common way to share data between nearby devices, the threat can be affected by a variety of technologies, from conventional and mobile computers to a variety of gadgets from Internet class things.



The attack "Blueborne", which was called this gap requires no interaction with the user, and this makes it more dangerous. You can learn more about this vulnerability by clicking here.
You can watch the video below to see how the full control is penetrated on the phone



But the question that you might ask is how do I know that my system is infected with this change and how to protect it?

Detected for the gag already told all the software manufacturers and devices including Apple, Google, Microsoft, and Linux community. These companies have begun to launch security updates for their users to fill the gap. However, it may take several days or even weeks before posting.

Therefore, security and protection experts recommend the need to disconnect and disable Bluetooth on all devices, or if it is impossible, use this protocol "BNEP" less. Make sure to install all security updates that will appear in the near future.

For users of Android phones, check to see if their devices are infected by this vulnerability through a special tool, an application released by Armis. This application not only checks your device but also lets you know if the devices connected to your phone are infected with this vulnerability.

Download Link

Post a Comment

0 Comments