New Attack Vector “BlueBorne” Exposes 5B+ Devices – Learn How It Works

Presented by Nadir Izrael, CTO, Armis


New Attack Vector “BlueBorne” Exposes 5B+ Devices – Learn How It Works

As Fortune reported on Tuesday, the new Blueborne attack vector exposed 5B+ devices to hacking, endangering major mobile, desktop, and IoT operating systems, including Android, iOS, Windows, and Linux. Blueborne attacks devices via Bluetooth in a manner never seen before, and spreads through the air (airborne). Users do not need to be on the Internet, take any action, or even pair with another device to be impacted. Blueborne has been called “Bluetooth’s Stagefright moment.”

Watch this webinar to learn:

  • Understand the 8 zero-day vulnerabilities (4 critical)
  • Which devices are affected
  • How Blueborne can take over a device
  • How BlueBorne can be used for a Man in the Middle Attack
  • What’s involved in protecting your network

About the Speaker:

As co-founder and CTO, Nadir Izrael guides the technology vision behind Armis to protect unmanaged and IoT devices. He co-founded the company in 2015 with its CEO, Yevgeny Dibrov. Prior to Armis, worked at Google as senior software engineer. Before Google, Nadir spent six years in the Israeli army, specifically in unit 8200, where he designed and programmed software projects and systems, served as team leader and did officer’s training attaining the rank of captain.

Watch On-demand