BlueBorne virus that spreads via bluetooth could affect billions of devices, cyber experts warn

Author: George Roberts Published by ABC News.   September 13, 2017

An airborne computer virus with the ability to infect billions of phones and other devices has been identified by internet security analysts. The so-called ‘BlueBorne vulnerability’ allows malicious virus attacks to spread from device to device over bluetooth without the owner’s knowledge.

Ty Miller, managing director of international cyber security firm Threat Intelligence, said this could be one of the most dangerous security flaws that has come out to date.Mr. Miller said the BlueBorne infection method was more dangerous than past attacks, such as the WannaCry ransomware attack. That is because the virus is airborne and can spread without people clicking on a link or being on the internet.

“It’s estimated to potentially affect up to 8 billion around the world, and that’s because it’s got the capability to infect Window, Linux, Android and iOS devices prior to iOS 10,” he said.”So the latest iOS isn’t affected.”

BlueBorne was identified by researchers from Armis Labs, who alerted tech companies as far back as April, so that security patches and upgrades could be created before hackers had the chance to exploit the ‘vulnerability’.Armis Labs has now released warning videos, telling of the danger of BlueBorne.

“It spreads locally over the air, via Bluetooth and the hacker does not need pair with the target device,” the Armis Labs warning says.

But even though there are security patches available, unprotected systems, of which there are billions of devices around the world, remain vulnerable to a BlueBorne attack.

I Thought We Had “SMART” Networks!

Well, we do, but until now, only large corporations could afford them.How did all of this get started?. First, we had “plain old telephone service” (POTS), then we had supersonic 56 kbps private lines connecting two locations. Next came faster private lines (PL) – 1.544 Mbps and multiple locations. These PL’s became MAN’s, WANs and then virtual WAN’s (VPN) followed by MPLS (What?). Now, a decade later, we have SD WAN connecting 100’s of locations at speeds up to 1G! Confused? Don’t be.


What drove this evolution in intelligent connectivity and speed? The catalyst…an information explosion in parallel with a flood of transformative business applications. We moved from paper to paperless, to cloud voice and computing, single location to global teams, collaboration tools, big data, machine learning and, unbelievably, artificial intelligence!

Scam of the Week: Hurricane Harvey Charity Fraud

Hurricane Harvey hit hard and especially Houston, TX got badly flooded. The death toll is rising and you can also count on low-life cyber-scum exploiting this disaster. Disgusting.

Scammers are now using the Hurricane Harvey disaster to trick people in clicking on links, on Facebook, Twitter and phishing emails trying to solicit charitable giving for the flood victims.Here are some examples:

What is the difference between a LAN, a MAN, and a WAN?

A LAN (local area network) is a group of computers and network devices connected together, usually within the same building. By definition, the connections must be high speed and relatively inexpensive (e.g., token ring or Ethernet). Most Indiana University Bloomington departments are on LANs.

A LAN connection is a high-speed connection to a LAN. On the IUB campus, most connections are either Ethernet (10 Mbps) or Fast Ethernet (100 Mbps), and a few locations have Gigabit Ethernet (1000 Mbps) connections.