<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Bluetooth Vulnerability Affects All Major OS</title>
	<atom:link href="http://www.epanorama.net/blog/2017/09/14/bluetooth-vulnerability-affects-all-major-os/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2017/09/14/bluetooth-vulnerability-affects-all-major-os/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Thu, 16 Apr 2026 14:21:59 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/09/14/bluetooth-vulnerability-affects-all-major-os/comment-page-1/#comment-1563465</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 19 Sep 2017 11:18:24 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=59266#comment-1563465</guid>
		<description><![CDATA[BlueBorne Vulnerability Scanner by Armis
https://play.google.com/store/apps/details?id=com.armis.blueborne_detector

Check to see if your device - or those around you - is vulnerable to BlueBorne.

Armis discovered BlueBorne, a new attack vector, endangering major mobile, desktop, and IoT operating systems, including Android, iOS, Windows, and Linux, and the devices using them.

It includes 8 zero-day vulnerabilities, 4 of them critical. With BlueBorne, a hacker can take over your device or set up a man-in-the-middle attack. It leverages the most serious exploit in Bluetooth to date, and spreads through the air (airborne). You don’t need to pair with the attacking device. You Bluetooth just needs to be on.

Key points about BlueBorne:
- Penetrates secure &quot;air-gapped&quot; networks
- Spreads laterally to adjacent devices
- Impacts devices from Samsung, Google, Windows, Apple and more
- Microsoft, Android, Linux, and iOS are issuing updates]]></description>
		<content:encoded><![CDATA[<p>BlueBorne Vulnerability Scanner by Armis<br />
<a href="https://play.google.com/store/apps/details?id=com.armis.blueborne_detector" rel="nofollow">https://play.google.com/store/apps/details?id=com.armis.blueborne_detector</a></p>
<p>Check to see if your device &#8211; or those around you &#8211; is vulnerable to BlueBorne.</p>
<p>Armis discovered BlueBorne, a new attack vector, endangering major mobile, desktop, and IoT operating systems, including Android, iOS, Windows, and Linux, and the devices using them.</p>
<p>It includes 8 zero-day vulnerabilities, 4 of them critical. With BlueBorne, a hacker can take over your device or set up a man-in-the-middle attack. It leverages the most serious exploit in Bluetooth to date, and spreads through the air (airborne). You don’t need to pair with the attacking device. You Bluetooth just needs to be on.</p>
<p>Key points about BlueBorne:<br />
- Penetrates secure &#8220;air-gapped&#8221; networks<br />
- Spreads laterally to adjacent devices<br />
- Impacts devices from Samsung, Google, Windows, Apple and more<br />
- Microsoft, Android, Linux, and iOS are issuing updates</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/09/14/bluetooth-vulnerability-affects-all-major-os/comment-page-1/#comment-1563464</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 19 Sep 2017 11:17:54 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=59266#comment-1563464</guid>
		<description><![CDATA[Check if your bluetooth device is at risk

Armis Labs revealed last week that bluetooth wrangling potentially threatened up to 8 billion smartphones, tablets, computers, and IoT devices. The company has set up a mobile app that can check the vulnerability of your device.

According to Armis Labs, there have been a number of zero-day attacks that prove the functionality of the Blueborne vector. The hijack allows the hijacker to run remote code on the device and make a so-called Man-in-the-Middle attack.

The vulnerability of your Android device can be checked by Armis Labs with Blueborne Vulnerability Scnner, which runs on Google Play.

Source: http://www.etn.fi/index.php/13-news/6851-tarkista-onko-bluetooth-laitteesi-vaarassa]]></description>
		<content:encoded><![CDATA[<p>Check if your bluetooth device is at risk</p>
<p>Armis Labs revealed last week that bluetooth wrangling potentially threatened up to 8 billion smartphones, tablets, computers, and IoT devices. The company has set up a mobile app that can check the vulnerability of your device.</p>
<p>According to Armis Labs, there have been a number of zero-day attacks that prove the functionality of the Blueborne vector. The hijack allows the hijacker to run remote code on the device and make a so-called Man-in-the-Middle attack.</p>
<p>The vulnerability of your Android device can be checked by Armis Labs with Blueborne Vulnerability Scnner, which runs on Google Play.</p>
<p>Source: <a href="http://www.etn.fi/index.php/13-news/6851-tarkista-onko-bluetooth-laitteesi-vaarassa" rel="nofollow">http://www.etn.fi/index.php/13-news/6851-tarkista-onko-bluetooth-laitteesi-vaarassa</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/09/14/bluetooth-vulnerability-affects-all-major-os/comment-page-1/#comment-1562955</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 15 Sep 2017 07:54:36 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=59266#comment-1562955</guid>
		<description><![CDATA[Hey, Turn Bluetooth Off When You&#039;re Not Using It
https://www.wired.com/story/turn-off-bluetooth-security/

But in addition to endangering core devices such as smartphones and PCs, BlueBorne has implications for the billions of Bluetooth-equipped internet of things devices in the world including smart TVs, speakers, and even smart lightbulbs. Many of these devices are built on Linux and don&#039;t have a mechanism for distributing updates. Or even if they do, they rarely receive them in practice. Linux is working on but hasn&#039;t yet issued a BlueBorne patch.

When Bluetooth is on in a device, it is constantly open to and waiting for potential connections. So a BlueBorne attack starts by going through the process Webroot&#039;s Dufour describes—scanning for devices that have Bluetooth on and probing them for information such as device type and operating system to see if they have the relevant vulnerabilities.]]></description>
		<content:encoded><![CDATA[<p>Hey, Turn Bluetooth Off When You&#8217;re Not Using It<br />
<a href="https://www.wired.com/story/turn-off-bluetooth-security/" rel="nofollow">https://www.wired.com/story/turn-off-bluetooth-security/</a></p>
<p>But in addition to endangering core devices such as smartphones and PCs, BlueBorne has implications for the billions of Bluetooth-equipped internet of things devices in the world including smart TVs, speakers, and even smart lightbulbs. Many of these devices are built on Linux and don&#8217;t have a mechanism for distributing updates. Or even if they do, they rarely receive them in practice. Linux is working on but hasn&#8217;t yet issued a BlueBorne patch.</p>
<p>When Bluetooth is on in a device, it is constantly open to and waiting for potential connections. So a BlueBorne attack starts by going through the process Webroot&#8217;s Dufour describes—scanning for devices that have Bluetooth on and probing them for information such as device type and operating system to see if they have the relevant vulnerabilities.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/09/14/bluetooth-vulnerability-affects-all-major-os/comment-page-1/#comment-1562950</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 15 Sep 2017 06:04:56 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=59266#comment-1562950</guid>
		<description><![CDATA[BlueBorne Vulnerabilities Impact Over 5 Billion Bluetooth-Enabled Devices
https://www.bleepingcomputer.com/news/security/blueborne-vulnerabilities-impact-over-5-billion-bluetooth-enabled-devices/

BlueBorne affects all Bluetooth enabled devices

They affect the Bluetooth implementations in Android, iOS, Microsoft, and Linux, impacting almost all Bluetooth device types, from smartphones to laptops, and from IoT devices to smart cars.

Furthermore, the vulnerabilities can be concocted into a self-spreading BlueTooth worm that could wreak havoc inside a company&#039;s network or even across the world.

Not all devices will receive patches

Armis reported the vulnerabilities to major hardware and software vendors, such as Apple, Google, Microsoft, and the Linux community. Some patches are being developed and will be released today and in the coming days and weeks.

Nonetheless, some devices will never receive a BlueBorne patch as the devices have reached End-Of-Life and are not being supported. Armis estimates this number at around 40% of all Bluetooth-enabled devices, which is over two billion devices.

BlueBorne vulnerabilities are tracked under the following identifiers: CVE-2017-0781, CVE-2017-0782, CVE-2017-0783, and CVE-2017-0785 for Android devices; CVE-2017-1000251 and CVE-2017-1000250 for Linux; CVE-2017-14315 for iOS, and CVE-2017-8628 on Windows.

Who is affected

All Android phones, tablets, and wearables of all versions are affected by the four above mentioned vulnerabilities. Android devices using Bluetooth Low Energy only are not affected. Google patched the flaws in its September Android Security Bulletin.

Windows versions since Windows Vista are all affected. Microsoft said Windows phones are not impacted by BlueBorne. Microsoft secretly released patches in July for CVE-2017-8628, but only today included details about the fixed vulnerability in September&#039;s Patch Tuesday.

All Linux devices running BlueZ are affected by an information leak, while all Linux devices from version 3.3-rc1 (released in October 2011) are affected by a remote code execution flaw that can be exploited via Bluetooth. Samsung&#039;s Tizen OS, based on Linux, is also affected.

All iPhone, iPad and iPod touch devices with iOS 9.3.5 and lower, and AppleTV devices with version 7.2.2 and lower are affected, but the issue was patched in iOS 10.]]></description>
		<content:encoded><![CDATA[<p>BlueBorne Vulnerabilities Impact Over 5 Billion Bluetooth-Enabled Devices<br />
<a href="https://www.bleepingcomputer.com/news/security/blueborne-vulnerabilities-impact-over-5-billion-bluetooth-enabled-devices/" rel="nofollow">https://www.bleepingcomputer.com/news/security/blueborne-vulnerabilities-impact-over-5-billion-bluetooth-enabled-devices/</a></p>
<p>BlueBorne affects all Bluetooth enabled devices</p>
<p>They affect the Bluetooth implementations in Android, iOS, Microsoft, and Linux, impacting almost all Bluetooth device types, from smartphones to laptops, and from IoT devices to smart cars.</p>
<p>Furthermore, the vulnerabilities can be concocted into a self-spreading BlueTooth worm that could wreak havoc inside a company&#8217;s network or even across the world.</p>
<p>Not all devices will receive patches</p>
<p>Armis reported the vulnerabilities to major hardware and software vendors, such as Apple, Google, Microsoft, and the Linux community. Some patches are being developed and will be released today and in the coming days and weeks.</p>
<p>Nonetheless, some devices will never receive a BlueBorne patch as the devices have reached End-Of-Life and are not being supported. Armis estimates this number at around 40% of all Bluetooth-enabled devices, which is over two billion devices.</p>
<p>BlueBorne vulnerabilities are tracked under the following identifiers: CVE-2017-0781, CVE-2017-0782, CVE-2017-0783, and CVE-2017-0785 for Android devices; CVE-2017-1000251 and CVE-2017-1000250 for Linux; CVE-2017-14315 for iOS, and CVE-2017-8628 on Windows.</p>
<p>Who is affected</p>
<p>All Android phones, tablets, and wearables of all versions are affected by the four above mentioned vulnerabilities. Android devices using Bluetooth Low Energy only are not affected. Google patched the flaws in its September Android Security Bulletin.</p>
<p>Windows versions since Windows Vista are all affected. Microsoft said Windows phones are not impacted by BlueBorne. Microsoft secretly released patches in July for CVE-2017-8628, but only today included details about the fixed vulnerability in September&#8217;s Patch Tuesday.</p>
<p>All Linux devices running BlueZ are affected by an information leak, while all Linux devices from version 3.3-rc1 (released in October 2011) are affected by a remote code execution flaw that can be exploited via Bluetooth. Samsung&#8217;s Tizen OS, based on Linux, is also affected.</p>
<p>All iPhone, iPad and iPod touch devices with iOS 9.3.5 and lower, and AppleTV devices with version 7.2.2 and lower are affected, but the issue was patched in iOS 10.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/09/14/bluetooth-vulnerability-affects-all-major-os/comment-page-1/#comment-1562949</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 15 Sep 2017 05:59:37 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=59266#comment-1562949</guid>
		<description><![CDATA[https://threatpost.com/wireless-blueborne-attacks-target-billions-of-bluetooth-devices/127921/

In all, BlueBorne consists of eight related vulnerabilities, three of which are classified as critical. The vulnerabilities were found in the Bluetooth implementations in Android, Microsoft, Linux and iOS. They include:

*Linux kernel RCE vulnerability – CVE-2017-1000251
*Linux Bluetooth stack (BlueZ) information leak vulnerability – CVE-2017-1000250
*Android information leak vulnerability – CVE-2017-0785
*Android RCE vulnerabilities CVE-2017-0781 &amp; CVE-2017-0782
*The Bluetooth Pineapple in Android – Logical Flaw CVE-2017-0783
*The Bluetooth Pineapple in Windows – Logical Flaw CVE-2017-8628
*Apple Low Energy Audio Protocol RCE vulnerability – CVE Pending
An attack scenario includes an adversary identifying Bluetooth devices nearby and using commonly tools to identify the MAC address of vulnerable Bluetooth devices.

“By probing the device, the attacker can determine which operating system his victim is using, and adjust his exploit accordingly]]></description>
		<content:encoded><![CDATA[<p><a href="https://threatpost.com/wireless-blueborne-attacks-target-billions-of-bluetooth-devices/127921/" rel="nofollow">https://threatpost.com/wireless-blueborne-attacks-target-billions-of-bluetooth-devices/127921/</a></p>
<p>In all, BlueBorne consists of eight related vulnerabilities, three of which are classified as critical. The vulnerabilities were found in the Bluetooth implementations in Android, Microsoft, Linux and iOS. They include:</p>
<p>*Linux kernel RCE vulnerability – CVE-2017-1000251<br />
*Linux Bluetooth stack (BlueZ) information leak vulnerability – CVE-2017-1000250<br />
*Android information leak vulnerability – CVE-2017-0785<br />
*Android RCE vulnerabilities CVE-2017-0781 &amp; CVE-2017-0782<br />
*The Bluetooth Pineapple in Android – Logical Flaw CVE-2017-0783<br />
*The Bluetooth Pineapple in Windows – Logical Flaw CVE-2017-8628<br />
*Apple Low Energy Audio Protocol RCE vulnerability – CVE Pending<br />
An attack scenario includes an adversary identifying Bluetooth devices nearby and using commonly tools to identify the MAC address of vulnerable Bluetooth devices.</p>
<p>“By probing the device, the attacker can determine which operating system his victim is using, and adjust his exploit accordingly</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/09/14/bluetooth-vulnerability-affects-all-major-os/comment-page-1/#comment-1562948</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 15 Sep 2017 05:55:09 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=59266#comment-1562948</guid>
		<description><![CDATA[EXPERT SAYS RISK OF BLUETOOTH ‘BLUEBORNE’ ATTACKS ACROSS MULTIPLE DEVICES OVERBLOWN
Security firm says &#039;BlueBorne&#039; is only a risk if your device isn&#039;t updated
https://www.google.fi/amp/s/www.digitaltrends.com/computing/bluetooth-vulnerabilities-blueborne-microsoft-google/amp/]]></description>
		<content:encoded><![CDATA[<p>EXPERT SAYS RISK OF BLUETOOTH ‘BLUEBORNE’ ATTACKS ACROSS MULTIPLE DEVICES OVERBLOWN<br />
Security firm says &#8216;BlueBorne&#8217; is only a risk if your device isn&#8217;t updated<br />
<a href="https://www.google.fi/amp/s/www.digitaltrends.com/computing/bluetooth-vulnerabilities-blueborne-microsoft-google/amp/" rel="nofollow">https://www.google.fi/amp/s/www.digitaltrends.com/computing/bluetooth-vulnerabilities-blueborne-microsoft-google/amp/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/09/14/bluetooth-vulnerability-affects-all-major-os/comment-page-1/#comment-1562947</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 15 Sep 2017 05:52:19 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=59266#comment-1562947</guid>
		<description><![CDATA[https://www.google.fi/amp/s/www.theverge.com/platform/amp/2017/9/12/16294904/bluetooth-hack-exploit-android-linux-blueborne]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.google.fi/amp/s/www.theverge.com/platform/amp/2017/9/12/16294904/bluetooth-hack-exploit-android-linux-blueborne" rel="nofollow">https://www.google.fi/amp/s/www.theverge.com/platform/amp/2017/9/12/16294904/bluetooth-hack-exploit-android-linux-blueborne</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/09/14/bluetooth-vulnerability-affects-all-major-os/comment-page-1/#comment-1562874</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 14 Sep 2017 19:08:58 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=59266#comment-1562874</guid>
		<description><![CDATA[Interesting idea, try at your own risl;

Have You Ever Wanted to See the Bluetooth Signals Around You?
https://blog.hackster.io/have-you-ever-wanted-to-see-the-bluetooth-signals-around-you-72d7e474cdc6

maker Toglefritz has come up with a unique and beautiful way to illustrate those Bluetooth signals. The technique pairs an Android app with long exposure photography. Once your phone is paired with the Bluetooth device you want to test the signal of, it will change color as the strength of the signal changes. Taking a long exposure photo (in the dark) while running the app lets you see how the signal changes as you move about the room.

Visualize Bluetooth in a Long Exposure Photo
http://www.instructables.com/id/Visualize-Bluetooth-in-a-Long-Exposure-Photo/]]></description>
		<content:encoded><![CDATA[<p>Interesting idea, try at your own risl;</p>
<p>Have You Ever Wanted to See the Bluetooth Signals Around You?<br />
<a href="https://blog.hackster.io/have-you-ever-wanted-to-see-the-bluetooth-signals-around-you-72d7e474cdc6" rel="nofollow">https://blog.hackster.io/have-you-ever-wanted-to-see-the-bluetooth-signals-around-you-72d7e474cdc6</a></p>
<p>maker Toglefritz has come up with a unique and beautiful way to illustrate those Bluetooth signals. The technique pairs an Android app with long exposure photography. Once your phone is paired with the Bluetooth device you want to test the signal of, it will change color as the strength of the signal changes. Taking a long exposure photo (in the dark) while running the app lets you see how the signal changes as you move about the room.</p>
<p>Visualize Bluetooth in a Long Exposure Photo<br />
<a href="http://www.instructables.com/id/Visualize-Bluetooth-in-a-Long-Exposure-Photo/" rel="nofollow">http://www.instructables.com/id/Visualize-Bluetooth-in-a-Long-Exposure-Photo/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/09/14/bluetooth-vulnerability-affects-all-major-os/comment-page-1/#comment-1562871</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 14 Sep 2017 19:05:26 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=59266#comment-1562871</guid>
		<description><![CDATA[Interesting idea, try at your own risl;

Have You Ever Wanted to See the Bluetooth Signals Around You?
https://blog.hackster.io/have-you-ever-wanted-to-see-the-bluetooth-signals-around-you-72d7e474cdc6

maker Toglefritz has come up with a unique and beautiful way to illustrate those Bluetooth signals. The technique pairs an Android app with long exposure photography. Once your phone is paired with the Bluetooth device you want to test the signal of, it will change color as the strength of the signal changes. Taking a long exposure photo (in the dark) while running the app lets you see how the signal changes as you move about the room.

Visualize Bluetooth in a Long Exposure Photo
http://www.instructables.com/id/Visualize-Bluetooth-in-a-Long-Exposure-Photo/]]></description>
		<content:encoded><![CDATA[<p>Interesting idea, try at your own risl;</p>
<p>Have You Ever Wanted to See the Bluetooth Signals Around You?<br />
<a href="https://blog.hackster.io/have-you-ever-wanted-to-see-the-bluetooth-signals-around-you-72d7e474cdc6" rel="nofollow">https://blog.hackster.io/have-you-ever-wanted-to-see-the-bluetooth-signals-around-you-72d7e474cdc6</a></p>
<p>maker Toglefritz has come up with a unique and beautiful way to illustrate those Bluetooth signals. The technique pairs an Android app with long exposure photography. Once your phone is paired with the Bluetooth device you want to test the signal of, it will change color as the strength of the signal changes. Taking a long exposure photo (in the dark) while running the app lets you see how the signal changes as you move about the room.</p>
<p>Visualize Bluetooth in a Long Exposure Photo<br />
<a href="http://www.instructables.com/id/Visualize-Bluetooth-in-a-Long-Exposure-Photo/" rel="nofollow">http://www.instructables.com/id/Visualize-Bluetooth-in-a-Long-Exposure-Photo/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/09/14/bluetooth-vulnerability-affects-all-major-os/comment-page-1/#comment-1562850</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 14 Sep 2017 13:25:58 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=59266#comment-1562850</guid>
		<description><![CDATA[BlueBorne White Paper
http://go.armis.com/hubfs/BlueBorne%20Technical%20White%20Paper.pdf

The dangers of Bluetooth implementations:

Unveiling zero day vulnerabilities and security flaws in modern Bluetooth stacks.]]></description>
		<content:encoded><![CDATA[<p>BlueBorne White Paper<br />
<a href="http://go.armis.com/hubfs/BlueBorne%20Technical%20White%20Paper.pdf" rel="nofollow">http://go.armis.com/hubfs/BlueBorne%20Technical%20White%20Paper.pdf</a></p>
<p>The dangers of Bluetooth implementations:</p>
<p>Unveiling zero day vulnerabilities and security flaws in modern Bluetooth stacks.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
