A security firm Armis has discovered a group of eight exploits together called Blueborne that can empower a hacker to have illegal access to your phone without having to touch it. The Blueborne attack can give the access to PC and Smartphones including the LoT devices.
The firm trusts that other such weaknesses in Bluetooth can be found in further research. These weaknesses are fully controllable and functional which allow a hacker to take control on your smartphone.
Doing so anyone can get information and sensitive data like passwords and browser history et cetera. The CEO of Seguru Ralph stated that the vulnerability affects almost all the devices we use today. It transforms the Bluetooth connectivity into a channel for hackers.
Making use of these vulnerabilities hacker can control apps and the screen. It’s not completely secretive now, though, in turning on the exploits you make the device come from the sleep. The complex vector starts by discovering a device to hack it making the device accept operations and later revealing the sensitive data like passwords.