Armis team of experts in digital security identified eight vulnerabilities in the Bluetooth protocol, which is widely used in modern gadgets. Critical experts called three vulnerabilities of zero day. Knowing about them and using the malicious BlueBorne, cybercriminals can easily bypass any user authentication system by infecting all equipment with Bluetooth enabled within the range of a signal in a matter of hours. Based on the principle of action, the speed of distribution and the level of potential threat, the programmers compared the new Trajan with WannaCry and Petya, who in two ways were able to paralyze the work of large enterprises and government agencies. To prevent an epidemic, Armis representatives contacted Apple, Google, Microsoft. Unfortunately, patches already released and currently under development will be available only on devices that are still supported by the manufacturer. This means that gadgets based on iOS 9.3.5 and older versions may be affected by cybercriminals in the first place.