Imagine a remote smartphone takeover that can happen with neither party being connected to the internet. Blueborne, a Bluetooth vulnerability revealed by security firm Armis Labs, makes that possible. It is an attack vector that
![](https://infosec.conncoll.edu/wp-content/uploads/2017/03/cropped-cropped-infosecblog_4.jpg)
Imagine a remote smartphone takeover that can happen with neither party being connected to the internet. Blueborne, a Bluetooth vulnerability revealed by security firm Armis Labs, makes that possible. It is an attack vector that