<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic New Set of Bluetooth Vulnerabilities Endangering Every Connected Device in Mobile</title>
    <link>https://community.checkpoint.com/t5/Mobile/New-Set-of-Bluetooth-Vulnerabilities-Endangering-Every-Connected/m-p/6265#M59</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The IoT cybersecurity firm, Armis, has&amp;nbsp;&lt;A href="https://www.armis.com/blueborne" style="color: #e65785; background-color: transparent; text-decoration: none;"&gt;revealed eight vulnerabilities&lt;/A&gt;&amp;nbsp;in the implementation of Bluetooth in several operating systems, including Android, Windows, Linux, and iOS, successful exploitation of which could allow hackers to take complete control of a device. Indeed, these are the most severe vulnerabilities found in Bluetooth in recent years and are worrying due to their ability to be spread over an air interface. They have been termed ‘The BlueBorne Vulnerabilities’.&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN style="background-color: #ffffff; color: #993366;"&gt;Check Point SandBlast Mobile&lt;/SPAN&gt;&lt;SPAN style="color: #222222; background-color: #ffffff;"&gt; can protect mobile devices from this threat, both on iOS and Android, by helping to verify that mobile devices on your network are in compliance with the latest OS versions and security patches.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;For more technical information around the vulnerabilities and how to fill the gap, please refer to the relevant Check Point blog&lt;SPAN style="color: #1f497d;"&gt; &lt;A href="http://blog.checkpoint.com/2017/09/12/blueborne-new-set-bluetooth-vulnerabilities-endangering-every-connected-device/"&gt;here&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 13 Sep 2017 07:32:18 GMT</pubDate>
    <dc:creator>Daniel_Dor</dc:creator>
    <dc:date>2017-09-13T07:32:18Z</dc:date>
    <item>
      <title>New Set of Bluetooth Vulnerabilities Endangering Every Connected Device</title>
      <link>https://community.checkpoint.com/t5/Mobile/New-Set-of-Bluetooth-Vulnerabilities-Endangering-Every-Connected/m-p/6265#M59</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The IoT cybersecurity firm, Armis, has&amp;nbsp;&lt;A href="https://www.armis.com/blueborne" style="color: #e65785; background-color: transparent; text-decoration: none;"&gt;revealed eight vulnerabilities&lt;/A&gt;&amp;nbsp;in the implementation of Bluetooth in several operating systems, including Android, Windows, Linux, and iOS, successful exploitation of which could allow hackers to take complete control of a device. Indeed, these are the most severe vulnerabilities found in Bluetooth in recent years and are worrying due to their ability to be spread over an air interface. They have been termed ‘The BlueBorne Vulnerabilities’.&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN style="background-color: #ffffff; color: #993366;"&gt;Check Point SandBlast Mobile&lt;/SPAN&gt;&lt;SPAN style="color: #222222; background-color: #ffffff;"&gt; can protect mobile devices from this threat, both on iOS and Android, by helping to verify that mobile devices on your network are in compliance with the latest OS versions and security patches.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;For more technical information around the vulnerabilities and how to fill the gap, please refer to the relevant Check Point blog&lt;SPAN style="color: #1f497d;"&gt; &lt;A href="http://blog.checkpoint.com/2017/09/12/blueborne-new-set-bluetooth-vulnerabilities-endangering-every-connected-device/"&gt;here&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Sep 2017 07:32:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Mobile/New-Set-of-Bluetooth-Vulnerabilities-Endangering-Every-Connected/m-p/6265#M59</guid>
      <dc:creator>Daniel_Dor</dc:creator>
      <dc:date>2017-09-13T07:32:18Z</dc:date>
    </item>
  </channel>
</rss>

