Bluetooth Worm and Linux Exploit Revealed by Armis at Black Hat Europe

By Ben Seri, Head of Research Today at the Black Hat security conference in Europe, I had the opportunity to reveal new details regarding BlueBorne, the airborne attack vector first disclosed discovered in September 2017. Along with Armis researcher Gregory … Continue Reading

Featured Post

Armis Named One of CRN’s Internet of Things 50

Armis Recognized for Standout Contribution to the Internet of Things PALO ALTO, Calif., Dec. 4, 2017 /PRNewswire/ — Armis, the enterprise IoT security company, today announced that CRN®, a brand of The Channel Company, has named Armis to its 2017 … Continue Reading

Featured Post

BlueBorne Cyber Threat Impacts Amazon Echo and Google Home

Following the disclosure of the BlueBorne attack vector this past September, Armis discovered that critical Bluetooth vulnerabilities impact the Amazon Echo and Google Home. These new IoT voice-activated Personal Assistants join the extensive list of affected devices. Personal Assistants are … Continue Reading

Featured Post

Airborne Cyber Threats Reach Amazon Echo and Google Home, Reveals IoT Security Company Armis

20M IoT Devices Putting Enterprises, Homes at Risk PALO ALTO, Calif., NOV. 15, 2017 — Armis, the enterprise IoT security company, today announced that popular, voice-activated personal assistant devices including the Amazon Echo and Google Home were impacted by BlueBorne … Continue Reading

Featured Post

BlueBorne on Android: Exploiting an RCE Over the Air

This past weekend, Armis researchers Ben Seri and Gregory Vishnepolsky presented a detailed explanation of the Android Remote Code Execution vulnerabilities related to the BlueBorne attack vector at the Hacktivity conference. This presentation included new information regarding the vulnerability, as … Continue Reading

Featured Post

Wi-Fi Attack Vulnerability: A Foundational KRACK in Enterprise Security

Today researchers have disclosed major weaknesses in WPA2. Called a Krack attack (key reinstallation attacks), it can allow an attacker to decrypt WPA2 traffic and in some cases inject or tamper with data. The attack targets the 4-way handshake that establishes … Continue Reading

Featured Post