Citrix: Blueborne: Protect Endpoints from Bluetooth Vulnerabilities with XenMobile
On Sept. 12, Armis labs disclosed that they have identified 8 new vulnerabilities in Bluetooth potentially exposing any Bluetooth-enabled device including Android, Windows, Linux, iOS, and various IoT devices to attack. These attacks could range from remotely switching on cameras for pictures and videos, turning on microphones, to stealing credentials by MITM (Man-In-The-Middle) attacks, etc.
More than 8 billion Bluetooth-enabled devices are at risk. This pretty much includes every “smart” device: from your smartphone, smart watch, smart TV to connected home. The scary part is that an attack does not require any user interaction; if your Bluetooth is switched on, you are a potential victim of eavesdropping and identity theft.
This Bluetooth vulnerability can potentially allow hackers to do one or more of the following depending on the platform, OS version, etc.:
- Take full control of the device remotely
- Route all traffic through a malicious proxy by reconfiguring IP routing
- Leak Bluetooth encryption keys
- Memory corruption
- Remote code execution
Read the entire article here, Blueborne: Protect Endpoints from Bluetooth Vulnerabilities with XenMobile
Via the fine folks at Citrix Systems, Inc.
White Papers
‘All You Need to Know About Microsoft Windows Nano Server’ Veeam White Paper
Now updated for Windows Server 2016 GA release! You probably heard about Windows Nano Server already … but what is it exactly, and how do you get started with it? What value will it bring to your environment? Nano Server is a headless, 64-bit only deployment option for Windows Server 2016. Microsoft created this component specifically with […]
Share this:
‘The Citrix Administrator’s Guide to Citrix ICA/HDX’ White Paper
‘The Technical Guide to Migrating from Citrix 6.5 to 7.x and Replacing EdgeSight’ White Paper
Complete Guide to Understanding the Citrix Logon Process
‘Securing IGEL OS Endpoints’ White Paper
‘Managing Java Application Performance in a Citrix Environment’ White Paper