New BlueBorne attack can access computers, phones, and IoT devices, in seconds.

If you build it, they will find a way to exploit it. That’s the feeling in the security industry, where another day means another vulnerability for hackers to use to infiltrate a variety of devices and networks. This time, it’s a Bluetooth flaw that lets outsiders access your phone and any other connected devices.

Fortunately, this time it was the good guys who uncovered a series of eight vulnerabilities that are being collectively referred to as BlueBorne. Armis researchers discovered the potential attack portal that can affect everything from a phone to an IoT connected device – hacking them in as little as 10 seconds. Using BlueBorne, a hacker can not only conduct remote functions, but can also use the affected device to launch a variety of other forms of attacks.

Security company Armis has found a collection of eight exploits, collectively called BlueBorne, that can allow an attacker access to your phone without touching it. The attack can allow access to computers and phones, as well as IoT devices.

Security company Armis has found a collection of eight exploits, collectively called BlueBorne.

No download required

Even though it doesn’t require any effort on the part of the victim – meaning there’s no need to get you to download the malicious software or grab an infected app for this to work to a hacker’s benefit – it does let the user know when someone is utilizing the device. Unfortunately, once again, Android phones seem to be the hardest hit. Apple phones and tablets won’t work this way, nor will Windows phones. Google is reportedly issuing a patch very soon to remedy the situation, so be on the lookout for this important update and install it.


The crisis behind BlueBorne isn’t the creativity of the cybercriminals, but rather the complete lack of foresight on the part of developers to figure out how someone might try to work around the security and use it for their gain. The industry continues to be shocked by the latest threats, as though no one in the room had ever analyzed a new software, network, or piece of technology and wondered how someone might break in. As the internet of things has taught us all too well, as a whole we have to start looking for the problems before releasing the innovation to consumers.

Protect your device – download the latest security and anti-malware software now – here on