{"id":70303,"date":"2017-09-22T16:26:04","date_gmt":"2017-09-22T23:26:04","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=70303"},"modified":"2017-11-22T11:39:26","modified_gmt":"2017-11-22T19:39:26","slug":"what-is-blueborne-an-apple-device-faq","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/what-is-blueborne-an-apple-device-faq\/","title":{"rendered":"What is BlueBorne? An Apple Device FAQ"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-70312\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/logo-blueborne.png\" alt=\"\" width=\"259\" height=\"246\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/logo-blueborne.png 259w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/logo-blueborne-150x142.png 150w\" sizes=\"(max-width: 259px) 100vw, 259px\" \/><\/p>\n<p>From the number of inquiries Intego has received throughout the past week, it&#8217;s evident that &#8220;BlueBorne&#8221; is something of concern for a lot of users of Apple products.<\/p>\n<p>Let&#8217;s start with briefly explaining what BlueBorne is, and then delve into how it might affect you and your Apple devices.<\/p>\n<h3>What is BlueBorne?<\/h3>\n<p>Armis, a company focused on Internet of Things (IoT) security, recently published a <a href=\"https:\/\/www.armis.com\/blueborne\/\" target=\"_blank\">site<\/a> and a <a href=\"http:\/\/go.armis.com\/hubfs\/BlueBorne%20Technical%20White%20Paper.pdf?t=1505222709963\" target=\"_blank\">white paper<\/a> detailing eight Bluetooth-related vulnerabilities that they collectively call &#8220;BlueBorne.&#8221;<\/p>\n<p>The name BlueBorne is a portmanteau of the words Bluetooth and airborne, because BlueBorne attacks are wireless by nature.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-70315\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/bluetooth-logo-300x73.png\" alt=\"\" width=\"300\" height=\"73\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/bluetooth-logo-300x73.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/bluetooth-logo-150x37.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/bluetooth-logo.png 347w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>Armis claims in their <a href=\"https:\/\/www.armis.com\/armis-identifies-new-airborne-cyber-threat-blueborne-exposes-almost-every-device-remote-attack\/\" target=\"_blank\">press release<\/a> that &#8220;nearly all devices with Bluetooth capabilities, including smartphones, &#8230; laptops, watches, smart TVs, and even some automobile audio systems, are vulnerable to this attack.&#8221;<\/p>\n<p>Bluetooth pairing and discoverability mode are not required by the attack.<\/p>\n<p>The company claims that, if exploited, BlueBorne vulnerabilities could make it possible for an attacker to do such nefarious things as take complete control of affected devices, steal data in transit, and spread malware.<\/p>\n<p>And here&#8217;s the kicker: <em>all of this can be done without requiring any user interaction.<\/em><\/p>\n<p>Because such an attack can be carried out surreptitiously, affected users may have no idea that their Bluetooth-enabled systems have been compromised by an attacker.<\/p>\n<h3>Which Apple devices are affected?<\/h3>\n<p>The following Apple products are specifically called out by Armis as being <strong>vulnerable to BlueBorne attacks<\/strong>:<\/p>\n<ul>\n<li><strong>All iPhone, iPad, and iPod touch devices with iOS 9.3.5 or earlier<\/strong><\/li>\n<li><strong>All Apple TV devices with version 7.2.2 or earlier<\/strong><\/li>\n<\/ul>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-70324\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/iOS-9-icon-1024x1024-300x300.png\" alt=\"\" width=\"240\" height=\"240\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/iOS-9-icon-1024x1024-300x300.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/iOS-9-icon-1024x1024-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/iOS-9-icon-1024x1024-768x768.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/iOS-9-icon-1024x1024-657x657.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/iOS-9-icon-1024x1024-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/iOS-9-icon-1024x1024-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/iOS-9-icon-1024x1024-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/iOS-9-icon-1024x1024-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/iOS-9-icon-1024x1024-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/iOS-9-icon-1024x1024.png 1024w\" sizes=\"(max-width: 240px) 100vw, 240px\" \/><\/p>\n<p style=\"text-align: center;\">All devices still running the outdated iOS 9 are affected.<\/p>\n<p>Note that not all versions of Apple hardware can run a more current version of their respective operating systems.<\/p>\n<p>In particular, the following Apple products (and older versions)<strong> cannot be upgraded<\/strong> to an operating system version that protects against BlueBorne attacks:<\/p>\n<ul>\n<li>iPhone 4S and older<\/li>\n<li>iPad (3rd generation) and older<\/li>\n<li>iPad mini (1st generation) and older<\/li>\n<li>iPod touch (5th generation) and older<\/li>\n<li>Apple TV (3rd generation) and older<\/li>\n<\/ul>\n<p>According to the Armis report, iOS 10 and later are not susceptible to the BlueBorne vulnerabilities.\u00a0 Therefore if you have a <em>newer<\/em> device than the ones listed above, you&#8217;ll need to make sure you&#8217;ve updated to the highest version of the operating system that your device supports.<\/p>\n<p>You can go to the Settings app on your device to check whether an operating system update is available.\u00a0 On iOS devices, tap on Settings, then General, then Software Update.\u00a0 (To see what version of iOS you currently have, you can tap on About instead of Software Update.)<\/p>\n<p>(Keep in mind that many devices from other manufacturers, including devices running Android, Windows, or Linux operating systems\u2014including Samsung devices such as their Gear S3 smart watch and their Family Hub smart refrigerator\u2014are also affected. For non-Apple devices that may be affected, check with the manufacturer to see if an update is available.)<\/p>\n<h3>Are Macs affected? What about Apple Watch?<\/h3>\n<p>We noted that Armis made no public mention of Mac or macOS, or Apple Watch or watchOS, in their reports, so we reached out to them for comment.\u00a0 They responded:<\/p>\n<p>&#8220;At this time, Armis has not identified any macOS that are vulnerable to BlueBorne.&#8221;<\/p>\n<p>They also commented that &#8220;watchOS is not vulnerable at this time,&#8221; with the caveat that they needed to confirm with their researchers whether previous versions of watchOS were exposed.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" class=\"aligncenter wp-image-70318 size-large\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/apple-watch-on-macbook_1920-1024x683.jpg\" width=\"1024\" height=\"683\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/apple-watch-on-macbook_1920-1024x683.jpg 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/apple-watch-on-macbook_1920-150x100.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/apple-watch-on-macbook_1920-300x200.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/apple-watch-on-macbook_1920-768x512.jpg 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/apple-watch-on-macbook_1920-657x438.jpg 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/apple-watch-on-macbook_1920.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\u2705 Apple Watch and Mac are not known to be vulnerable to BlueBorne. Image: <a href=\"https:\/\/pixabay.com\/en\/macbook-laptop-apple-smart-watch-1500850\/\" target=\"_blank\">AlexBor<\/a><\/p>\n<h3>My Apple product is on your list of vulnerable devices! ? What can I do?<\/h3>\n<p>If you don&#8217;t use Bluetooth, you can mitigate the BlueBorne vulnerabilities by turning off the Bluetooth radio on your affected Apple device.\u00a0 This can be done via the Settings app.\u00a0 Once your device indicates that Bluetooth is off, you&#8217;re protected from BlueBorne.<\/p>\n<p>However, if your hardware is so old that you can&#8217;t upgrade to iOS 11 or tvOS 11, that means your device is susceptible to quite a few more unpatched vulnerabilities than BlueBorne alone; merely turning off Bluetooth won&#8217;t protect you from many other dangerous vulnerabilities.<\/p>\n<p>You should strongly consider upgrading to newer <strong>hardware that is capable of running iOS 11 or tvOS 11<\/strong>, of which the bare minimum includes:<\/p>\n<ul>\n<li>iPhone 5S or later (including iPhone SE; note that iPhone 5C is not compatible)<\/li>\n<li>iPad Air (1st generation) or later<\/li>\n<li>iPad mini 2 or later<\/li>\n<li>iPod touch (6th generation)<\/li>\n<li>Apple TV (4th generation) or later<\/li>\n<\/ul>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-70330\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/iOS-11-icon-340x340-300x300.png\" alt=\"\" width=\"240\" height=\"240\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/iOS-11-icon-340x340-300x300.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/iOS-11-icon-340x340-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/iOS-11-icon-340x340-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/iOS-11-icon-340x340-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/iOS-11-icon-340x340-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/iOS-11-icon-340x340-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/iOS-11-icon-340x340-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/iOS-11-icon-340x340.png 340w\" sizes=\"(max-width: 240px) 100vw, 240px\" \/><\/p>\n<p style=\"text-align: center;\">If you have a compatible device, upgrade to iOS 11.<\/p>\n<h3>So if I&#8217;m running iOS 10 or later, is it okay to leave Bluetooth enabled even when I&#8217;m not using it?<\/h3>\n<p>Sure, you <em>can<\/em>&#8230; if you trust Bluetooth.<img loading=\"lazy\" class=\"alignright wp-image-70321\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/bluetooth_disabled_320px.png\" alt=\"\" width=\"125\" height=\"157\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/bluetooth_disabled_320px.png 214w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/bluetooth_disabled_320px-120x150.png 120w\" sizes=\"(max-width: 125px) 100vw, 125px\" \/><\/p>\n<p>Armis, however, warns that although iOS 10 and iOS 11 are not vulnerable to the BlueBorne attack, they believe &#8220;many more vulnerabilities await discovery in the various platforms using Bluetooth.&#8221;<\/p>\n<p>Other security professionals including Steve Gibson have long <a href=\"https:\/\/www.grc.com\/sn\/sn-629-notes.pdf\" target=\"_blank\">cautioned<\/a> to turn off any wireless radios that you don&#8217;t actively use. Gibson has noted that Apple has a habit of reenabling Bluetooth after every major and minor iOS upgrade, even if the user has explicitly turned it off.<\/p>\n<p>Our advice?<\/p>\n<p>If you don&#8217;t use Bluetooth at all, you might as well leave it off, and after each iOS update make sure to turn it off again.<\/p>\n<p>If you do use Bluetooth on a regular basis, consider turning it off whenever you&#8217;re not using it; it&#8217;s fairly easy to turn it off and back on.<\/p>\n<p>Well, at least it used to be.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" class=\"aligncenter wp-image-70306\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/ios11-iphone7-control-center-network-settings-animation-147x300.gif\" alt=\"\" width=\"179\" height=\"365\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/ios11-iphone7-control-center-network-settings-animation-147x300.gif 147w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/ios11-iphone7-control-center-network-settings-animation-74x150.gif 74w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/ios11-iphone7-control-center-network-settings-animation-503x1024.gif 503w\" sizes=\"(max-width: 179px) 100vw, 179px\" \/>As of iOS 11, you can&#8217;t truly turn off Bluetooth by swiping up anymore. Image: <a href=\"https:\/\/support.apple.com\/en-us\/HT202769\" target=\"_blank\">Apple<\/a><\/p>\n<p>Take caution if you&#8217;ve upgraded to iOS 11, because when you attempt to disable Bluetooth or Wi-Fi from the new Control Center by swiping up from the bottom of the screen, it doesn&#8217;t actually turn the radios off.<\/p>\n<p>Apparently, according to Vice&#8217;s Motherboard <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/evpz7a\/turn-off-wi-fi-and-bluetooth-apple-ios-11\" target=\"_blank\">blog<\/a>, Apple sees this as a feature, not a bug.<\/p>\n<p>If you really want the radios off, you now have to disable Bluetooth or Wi-Fi from the Settings app.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>From the number of inquiries Intego has received throughout the past week, it&#8217;s evident that &#8220;BlueBorne&#8221; is something of concern for a lot of users of Apple products. Let&#8217;s start with briefly explaining what BlueBorne is, and then delve into how it might affect you and your Apple devices. What is BlueBorne? Armis, a company [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":70339,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[3151,3646,3649,3313,143],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"From the number of inquiries Intego has received throughout the past week, it&#039;s evident that &quot;BlueBorne&quot; is something of concern for a lot of users of\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/what-is-blueborne-an-apple-device-faq\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is BlueBorne? An Apple Device FAQ - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"From the number of inquiries Intego has received throughout the past week, it&#039;s evident that &quot;BlueBorne&quot; is something of concern for a lot of users of\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/what-is-blueborne-an-apple-device-faq\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-22T23:26:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-11-22T19:39:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/blueborne-bluetooth-vulnerabilities.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-blueborne-an-apple-device-faq\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/blueborne-bluetooth-vulnerabilities.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/blueborne-bluetooth-vulnerabilities.png\",\"width\":400,\"height\":260,\"caption\":\"BlueBorne Bluetooth Vulnerabilities\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-blueborne-an-apple-device-faq\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-blueborne-an-apple-device-faq\/\",\"name\":\"What is BlueBorne? An Apple Device FAQ - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-blueborne-an-apple-device-faq\/#primaryimage\"},\"datePublished\":\"2017-09-22T23:26:04+00:00\",\"dateModified\":\"2017-11-22T19:39:26+00:00\",\"description\":\"From the number of inquiries Intego has received throughout the past week, it's evident that \\\"BlueBorne\\\" is something of concern for a lot of users of\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-blueborne-an-apple-device-faq\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/what-is-blueborne-an-apple-device-faq\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-blueborne-an-apple-device-faq\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is BlueBorne? An Apple Device FAQ\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-blueborne-an-apple-device-faq\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-blueborne-an-apple-device-faq\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"What is BlueBorne? An Apple Device FAQ\",\"datePublished\":\"2017-09-22T23:26:04+00:00\",\"dateModified\":\"2017-11-22T19:39:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-blueborne-an-apple-device-faq\/#webpage\"},\"wordCount\":995,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-blueborne-an-apple-device-faq\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/blueborne-bluetooth-vulnerabilities.png\",\"keywords\":[\"Apple\",\"BlueBorne\",\"Bluetooth\",\"Internet of Things (IoT)\",\"Vulnerabilities\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/what-is-blueborne-an-apple-device-faq\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"From the number of inquiries Intego has received throughout the past week, it's evident that \"BlueBorne\" is something of concern for a lot of users of","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/what-is-blueborne-an-apple-device-faq\/","og_locale":"en_US","og_type":"article","og_title":"What is BlueBorne? An Apple Device FAQ - The Mac Security Blog","og_description":"From the number of inquiries Intego has received throughout the past week, it's evident that \"BlueBorne\" is something of concern for a lot of users of","og_url":"https:\/\/www.intego.com\/mac-security-blog\/what-is-blueborne-an-apple-device-faq\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2017-09-22T23:26:04+00:00","article_modified_time":"2017-11-22T19:39:26+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/blueborne-bluetooth-vulnerabilities.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-is-blueborne-an-apple-device-faq\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/blueborne-bluetooth-vulnerabilities.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/blueborne-bluetooth-vulnerabilities.png","width":400,"height":260,"caption":"BlueBorne Bluetooth Vulnerabilities"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-is-blueborne-an-apple-device-faq\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/what-is-blueborne-an-apple-device-faq\/","name":"What is BlueBorne? An Apple Device FAQ - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-is-blueborne-an-apple-device-faq\/#primaryimage"},"datePublished":"2017-09-22T23:26:04+00:00","dateModified":"2017-11-22T19:39:26+00:00","description":"From the number of inquiries Intego has received throughout the past week, it's evident that \"BlueBorne\" is something of concern for a lot of users of","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-is-blueborne-an-apple-device-faq\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/what-is-blueborne-an-apple-device-faq\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-is-blueborne-an-apple-device-faq\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"What is BlueBorne? An Apple Device FAQ"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-is-blueborne-an-apple-device-faq\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-is-blueborne-an-apple-device-faq\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"What is BlueBorne? An Apple Device FAQ","datePublished":"2017-09-22T23:26:04+00:00","dateModified":"2017-11-22T19:39:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-is-blueborne-an-apple-device-faq\/#webpage"},"wordCount":995,"commentCount":1,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-is-blueborne-an-apple-device-faq\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/blueborne-bluetooth-vulnerabilities.png","keywords":["Apple","BlueBorne","Bluetooth","Internet of Things (IoT)","Vulnerabilities"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/what-is-blueborne-an-apple-device-faq\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/blueborne-bluetooth-vulnerabilities.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-ihV","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/70303"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=70303"}],"version-history":[{"count":7,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/70303\/revisions"}],"predecessor-version":[{"id":72799,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/70303\/revisions\/72799"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/70339"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=70303"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=70303"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=70303"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}