SlideShare a Scribd company logo
THE DAILY NEWS
SATURDAY
22 September
2021
www.dailytechnologynews.com
Bluetooth Attacks and Security Tips – Awareness Results in
Better Protection
The history of Bluetooth is quite recent – the 1990s, to be
exact. Ericsson, a Swedish multinational active in the
networking and telecommunications domain, developed
Bluetooth. The name ‘Bluetooth’ comes from a renowned
10th century Danish King, Harald “Bluetooth” Gormsson,
responsible for uniting Norway and Denmark. The
Bluetooth logo is a combination of Harald’s initials.
Dr. Jaap Haarsten is the man credited with conceiving the
idea for Bluetooth, and while it was invented in 1994, the
first Bluetooth enabled consumer product was only
launched five years later in 1999. This a was a hands-free
mobile headset,and its launch was followed by the launch
of Bluetooth-enabled dongles and mice, with the first
Bluetooth-equipped mobile phone hitting the shelves in
2000.
The evolution in Bluetooth has been swift since it
came into being in the 1990s: at first limited in
reach, it has become an all-encompassing
standard that caters to multiple use cases.From
wireless music to file sharing, from device
pairing to household appliances and accessories,
the standard covers a gamut of uses.
Bluetooth can be a security risk
Any technology that has a massive and ever-
increasing market penetration will inevitably be
on the radar of hackers and cybercriminals. Their
focus is always on the number of peopleusing a
specific technology, it’s reach, and leverage. It’s
no surprisethen that there are plenty of security
risks associated with Bluetooth.
Bluetooth works by establishing a Wireless Personal Area
Network (WPAN) to connect Bluetooth enabled devices
with one another. Bluetooth-connected devices share data
with one another and you want this data to be safe and
secure. Moreover, you don’t want criminals to gain access
to your Bluetooth-enabled devices. There is a critical need
for us to be aware of the associated risks so that we can take
steps definitive steps to protect us against Bluetooth attacks.
Some common types of Bluetooth attacks:
BlueJacking
Yep, no prizes for guessing it is a combination of two
words – Bluetooth and hijacking. This is a typeof attack
in which a Bluetooth-enabled device hijacks another
Bluetooth device to send spamadvertising.
Imagine youare in a public place with the Bluetoothon your
Imagine you are in a public place with the Bluetooth on your
device switched on. There is a criminal at work in the public
space with a BlueJacking device, and they pair thedevice with
yours and starts to spend spam-styleadvertising messages. At
face value, this problem sounds like an annoyance more than
anything else, but what if one of these messages contains a
malicious link? Or is a carefully crafted message that convinces
you to share sensitive personalinformation?A BlueJacking
attempt can go from an annoyance to a critical security issue.
THE DAILY NEWS
SATURDAY
22 September
2021
BlueSmacking (A DoS or denial-of-service attack)
A DoS attack involves a server or device receiving a truckload of data
packets, or even over-sized data packets it finds difficult to handle. The
result is that thedevice shuts down or malfunctions. What if your
Bluetooth device is considered important enough to launch a denial-of-
service (DoS) attack against?
This is not as farfetched as it sounds. Today,
mobile devices are not just used for calling or
sending messages. Phones, tablets, and laptops are
being used to storeimportant information and
execute programs that have a direct impact on a
business-critical project. Now imagine a
BlueSmacking attack against numerous such
devices that are a part of a single organization.
BlueSnarfing
This is the more ‘frightening’ version of ‘BlueJacking’. While the latter
sends data, theBlueSnarfing steals data. As in all attacks which aim to
gain unauthorized access to data, you won’t realize someone has
accessed your data until it is too late.
Picture a scenario in which you are at the airport and having some free
time on your hands before you board your flight, you decide to get some
work done.
Unbeknownst to you, the person sitting next
to you is a hacker who is just waiting for an
opportunity to BlueSnarf unsuspecting users
such are yourself. If your Bluetooth is
switched on, your device is paired
clandestinely and thedata on your device is
accessed, which can include emails, text
messages, and much more.
Eavesdropping
We are living in a world where we are working from home and
attending numerous business meetings throughout theday. Many of the
headsets we use are Bluetooth enabled. Criminals can exploit
vulnerabilities in such headsets and eavesdrop on your conversations.
Here’s the really scary bit. Hackers can
eavesdrop on theconversations you are
having with the peoplearound you as well.
This is the kind of breach of privacy that
can result in bigger problems.
THE DAILY NEWS
SATURDAY
22 September
2021
The ‘opensesame’ bug
Cybercriminals can also create a backdoor on your device or laptop using Bluetooth. Once a backdoor has been
established,the attacker can have a field day as they can access all manner of sensitive information stored on this
device. You won’t realize it, but a criminal can spy on all youractivities on the device. Imagine the potential for
havoc.
How do you protect yourself?
Now that you know the security risks, how do you protect yourself?It’s not that difficult if you take the basic steps.
 Always be very aware of where your device is. Do not misplace it or forget about where you have kept it. This is
super important if you are working from a public space. Also, if you do lose your phone, make sure you can
easily lock it remotely.
 Get into the habit of not using Bluetooth to transfer sensitive information. If you do share important files, encrypt
them first.
 If you are not using your Bluetooth, turn it off. When you do this, you switch off a possiblecyberattack vector.
Documentery made by:-
Shravani S.Patil
Class:- 9th
A Roll no.:-12

More Related Content

What's hot

Cyber Warfare - Milan 2015
Cyber Warfare - Milan 2015Cyber Warfare - Milan 2015
Cyber Warfare - Milan 2015
Marco Pozzato
 
Mobileteleseczabout
MobileteleseczaboutMobileteleseczabout
Mobileteleseczabout
mobiletelesecz
 
Bluetooth Hacking
Bluetooth HackingBluetooth Hacking
Bluetooth Hacking
ShritamKumarMund
 
ISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloISSC456_Final_J_Intindolo
ISSC456_Final_J_Intindolo
John Intindolo
 
FUTURE SCHLOCK Joyce Schwarz LA FUTURISTS TALK
FUTURE SCHLOCK Joyce Schwarz LA FUTURISTS TALKFUTURE SCHLOCK Joyce Schwarz LA FUTURISTS TALK
FUTURE SCHLOCK Joyce Schwarz LA FUTURISTS TALK
Joyce Schwarz
 
Lesson2.9 n u2l6 public keys
Lesson2.9 n u2l6 public keysLesson2.9 n u2l6 public keys
Lesson2.9 n u2l6 public keys
Lexume1
 
עומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגת
עומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגתעומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגת
עומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגת
Dr. Anat Klumel
 
Mobile phones are nuisance
Mobile phones are nuisanceMobile phones are nuisance
Mobile phones are nuisance
Anis Zulaikha
 
Crime & technology
Crime & technologyCrime & technology
Crime & technology
Daniel Anzures
 
Cscs (4)
Cscs (4)Cscs (4)
Cscs (4)
narmeenadnan
 
Evolution of information security
Evolution of information securityEvolution of information security
Evolution of information security
Anton Shvydkyi
 
Do’s & don’ts of computer security rough
Do’s & don’ts of computer security  roughDo’s & don’ts of computer security  rough
Do’s & don’ts of computer security rough
Nathaniel (Nate) Tuenge
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivism
Bilal Ali
 
Smartphone safety
Smartphone safetySmartphone safety
Smartphone safety
Ernest Staats
 
Earthmouse: Mobile Guardian
Earthmouse: Mobile GuardianEarthmouse: Mobile Guardian
Earthmouse: Mobile Guardian
earthmouse
 
Information security consciousness
Information security consciousnessInformation security consciousness
Information security consciousness
Ciarán Mc Mahon
 
It hotspot shield new
It hotspot shield newIt hotspot shield new
It hotspot shield new
Hamad201030515
 
Stop in the name of norton
Stop in the name of nortonStop in the name of norton
Stop in the name of norton
spkiely
 

What's hot (18)

Cyber Warfare - Milan 2015
Cyber Warfare - Milan 2015Cyber Warfare - Milan 2015
Cyber Warfare - Milan 2015
 
Mobileteleseczabout
MobileteleseczaboutMobileteleseczabout
Mobileteleseczabout
 
Bluetooth Hacking
Bluetooth HackingBluetooth Hacking
Bluetooth Hacking
 
ISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloISSC456_Final_J_Intindolo
ISSC456_Final_J_Intindolo
 
FUTURE SCHLOCK Joyce Schwarz LA FUTURISTS TALK
FUTURE SCHLOCK Joyce Schwarz LA FUTURISTS TALKFUTURE SCHLOCK Joyce Schwarz LA FUTURISTS TALK
FUTURE SCHLOCK Joyce Schwarz LA FUTURISTS TALK
 
Lesson2.9 n u2l6 public keys
Lesson2.9 n u2l6 public keysLesson2.9 n u2l6 public keys
Lesson2.9 n u2l6 public keys
 
עומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגת
עומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגתעומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגת
עומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגת
 
Mobile phones are nuisance
Mobile phones are nuisanceMobile phones are nuisance
Mobile phones are nuisance
 
Crime & technology
Crime & technologyCrime & technology
Crime & technology
 
Cscs (4)
Cscs (4)Cscs (4)
Cscs (4)
 
Evolution of information security
Evolution of information securityEvolution of information security
Evolution of information security
 
Do’s & don’ts of computer security rough
Do’s & don’ts of computer security  roughDo’s & don’ts of computer security  rough
Do’s & don’ts of computer security rough
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivism
 
Smartphone safety
Smartphone safetySmartphone safety
Smartphone safety
 
Earthmouse: Mobile Guardian
Earthmouse: Mobile GuardianEarthmouse: Mobile Guardian
Earthmouse: Mobile Guardian
 
Information security consciousness
Information security consciousnessInformation security consciousness
Information security consciousness
 
It hotspot shield new
It hotspot shield newIt hotspot shield new
It hotspot shield new
 
Stop in the name of norton
Stop in the name of nortonStop in the name of norton
Stop in the name of norton
 

Similar to Bluetooth Attacks.docx

Blue jacking
Blue jackingBlue jacking
Blue jacking
BindhuBhargaviTalasi
 
Bluejacking
BluejackingBluejacking
Bluejacking
VIKASH MEWAL
 
Blue Jacking
Blue Jacking Blue Jacking
Blue Jacking
YashwanthSampath1
 
Bluejacking
BluejackingBluejacking
Bluejacking
Jyoti Chintadi
 
Bluejacking by Niharika Mundra
Bluejacking  by Niharika MundraBluejacking  by Niharika Mundra
Bluejacking by Niharika Mundra
Niki mundra
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
ROHIT SAGAR
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
acijjournal
 
blue-JACKING.pptx
blue-JACKING.pptxblue-JACKING.pptx
blue-JACKING.pptx
22R25A0507PONNALOKES
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
Varna Shankar
 
NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2
Charles Klondike
 
Bluejacking
BluejackingBluejacking
Bluejacking
Komal Singh
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threat
Ali J
 
Bluejacking
BluejackingBluejacking
Bluejacking
PRADEEP Cheekatla
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
HAYDEECAYDA
 
11Wireless SecurityHere is a sample research paper that I .docx
11Wireless SecurityHere is a sample research paper that I .docx11Wireless SecurityHere is a sample research paper that I .docx
11Wireless SecurityHere is a sample research paper that I .docx
hyacinthshackley2629
 
Device Hacking
Device HackingDevice Hacking
Device Hacking
Damian T. Gordon
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
ankit680
 
Cyber Security: Stalking Prey: An RF Hackers Perspective
Cyber Security: Stalking Prey: An RF Hackers Perspective Cyber Security: Stalking Prey: An RF Hackers Perspective
Cyber Security: Stalking Prey: An RF Hackers Perspective
Signals Defense, LLC
 
Bluejacking sadhana
Bluejacking sadhanaBluejacking sadhana
Bluejacking sadhana
Sadhana28
 
Blue Jacking
Blue JackingBlue Jacking
Blue Jacking
vihangshah12
 

Similar to Bluetooth Attacks.docx (20)

Blue jacking
Blue jackingBlue jacking
Blue jacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Blue Jacking
Blue Jacking Blue Jacking
Blue Jacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking by Niharika Mundra
Bluejacking  by Niharika MundraBluejacking  by Niharika Mundra
Bluejacking by Niharika Mundra
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
blue-JACKING.pptx
blue-JACKING.pptxblue-JACKING.pptx
blue-JACKING.pptx
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threat
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
 
11Wireless SecurityHere is a sample research paper that I .docx
11Wireless SecurityHere is a sample research paper that I .docx11Wireless SecurityHere is a sample research paper that I .docx
11Wireless SecurityHere is a sample research paper that I .docx
 
Device Hacking
Device HackingDevice Hacking
Device Hacking
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
 
Cyber Security: Stalking Prey: An RF Hackers Perspective
Cyber Security: Stalking Prey: An RF Hackers Perspective Cyber Security: Stalking Prey: An RF Hackers Perspective
Cyber Security: Stalking Prey: An RF Hackers Perspective
 
Bluejacking sadhana
Bluejacking sadhanaBluejacking sadhana
Bluejacking sadhana
 
Blue Jacking
Blue JackingBlue Jacking
Blue Jacking
 

More from Shravani Patil

Taekwondo - The Korean Martial Art.ppsx
Taekwondo - The Korean Martial Art.ppsxTaekwondo - The Korean Martial Art.ppsx
Taekwondo - The Korean Martial Art.ppsx
Shravani Patil
 
Sun Temple.pptx
Sun Temple.pptxSun Temple.pptx
Sun Temple.pptx
Shravani Patil
 
Tabla Presentation.pptx
Tabla Presentation.pptxTabla Presentation.pptx
Tabla Presentation.pptx
Shravani Patil
 
India's Famous Hindi Author.pptx
India's Famous Hindi Author.pptxIndia's Famous Hindi Author.pptx
India's Famous Hindi Author.pptx
Shravani Patil
 
Poverty As A Challenge.pptx
Poverty As A Challenge.pptxPoverty As A Challenge.pptx
Poverty As A Challenge.pptx
Shravani Patil
 
Aves Presentation for class 9.pptx
Aves Presentation for class 9.pptxAves Presentation for class 9.pptx
Aves Presentation for class 9.pptx
Shravani Patil
 
𝑰𝒏𝒇𝒐𝒓𝒎𝒂𝒕𝒊𝒐𝒏 𝒐𝒇 𝑶𝒅𝒊𝒔𝒔𝒊 𝑪𝒍𝒂𝒔𝒔𝒊𝒄𝒂𝒍 𝑴𝒖𝒔𝒊𝒄
𝑰𝒏𝒇𝒐𝒓𝒎𝒂𝒕𝒊𝒐𝒏 𝒐𝒇 𝑶𝒅𝒊𝒔𝒔𝒊 𝑪𝒍𝒂𝒔𝒔𝒊𝒄𝒂𝒍 𝑴𝒖𝒔𝒊𝒄𝑰𝒏𝒇𝒐𝒓𝒎𝒂𝒕𝒊𝒐𝒏 𝒐𝒇 𝑶𝒅𝒊𝒔𝒔𝒊 𝑪𝒍𝒂𝒔𝒔𝒊𝒄𝒂𝒍 𝑴𝒖𝒔𝒊𝒄
𝑰𝒏𝒇𝒐𝒓𝒎𝒂𝒕𝒊𝒐𝒏 𝒐𝒇 𝑶𝒅𝒊𝒔𝒔𝒊 𝑪𝒍𝒂𝒔𝒔𝒊𝒄𝒂𝒍 𝑴𝒖𝒔𝒊𝒄
Shravani Patil
 
Conservation of water ppt by shravani patil
Conservation of water ppt by shravani patilConservation of water ppt by shravani patil
Conservation of water ppt by shravani patil
Shravani Patil
 

More from Shravani Patil (8)

Taekwondo - The Korean Martial Art.ppsx
Taekwondo - The Korean Martial Art.ppsxTaekwondo - The Korean Martial Art.ppsx
Taekwondo - The Korean Martial Art.ppsx
 
Sun Temple.pptx
Sun Temple.pptxSun Temple.pptx
Sun Temple.pptx
 
Tabla Presentation.pptx
Tabla Presentation.pptxTabla Presentation.pptx
Tabla Presentation.pptx
 
India's Famous Hindi Author.pptx
India's Famous Hindi Author.pptxIndia's Famous Hindi Author.pptx
India's Famous Hindi Author.pptx
 
Poverty As A Challenge.pptx
Poverty As A Challenge.pptxPoverty As A Challenge.pptx
Poverty As A Challenge.pptx
 
Aves Presentation for class 9.pptx
Aves Presentation for class 9.pptxAves Presentation for class 9.pptx
Aves Presentation for class 9.pptx
 
𝑰𝒏𝒇𝒐𝒓𝒎𝒂𝒕𝒊𝒐𝒏 𝒐𝒇 𝑶𝒅𝒊𝒔𝒔𝒊 𝑪𝒍𝒂𝒔𝒔𝒊𝒄𝒂𝒍 𝑴𝒖𝒔𝒊𝒄
𝑰𝒏𝒇𝒐𝒓𝒎𝒂𝒕𝒊𝒐𝒏 𝒐𝒇 𝑶𝒅𝒊𝒔𝒔𝒊 𝑪𝒍𝒂𝒔𝒔𝒊𝒄𝒂𝒍 𝑴𝒖𝒔𝒊𝒄𝑰𝒏𝒇𝒐𝒓𝒎𝒂𝒕𝒊𝒐𝒏 𝒐𝒇 𝑶𝒅𝒊𝒔𝒔𝒊 𝑪𝒍𝒂𝒔𝒔𝒊𝒄𝒂𝒍 𝑴𝒖𝒔𝒊𝒄
𝑰𝒏𝒇𝒐𝒓𝒎𝒂𝒕𝒊𝒐𝒏 𝒐𝒇 𝑶𝒅𝒊𝒔𝒔𝒊 𝑪𝒍𝒂𝒔𝒔𝒊𝒄𝒂𝒍 𝑴𝒖𝒔𝒊𝒄
 
Conservation of water ppt by shravani patil
Conservation of water ppt by shravani patilConservation of water ppt by shravani patil
Conservation of water ppt by shravani patil
 

Recently uploaded

Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
maazsz111
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 

Recently uploaded (20)

Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 

Bluetooth Attacks.docx

  • 1. THE DAILY NEWS SATURDAY 22 September 2021 www.dailytechnologynews.com Bluetooth Attacks and Security Tips – Awareness Results in Better Protection The history of Bluetooth is quite recent – the 1990s, to be exact. Ericsson, a Swedish multinational active in the networking and telecommunications domain, developed Bluetooth. The name ‘Bluetooth’ comes from a renowned 10th century Danish King, Harald “Bluetooth” Gormsson, responsible for uniting Norway and Denmark. The Bluetooth logo is a combination of Harald’s initials. Dr. Jaap Haarsten is the man credited with conceiving the idea for Bluetooth, and while it was invented in 1994, the first Bluetooth enabled consumer product was only launched five years later in 1999. This a was a hands-free mobile headset,and its launch was followed by the launch of Bluetooth-enabled dongles and mice, with the first Bluetooth-equipped mobile phone hitting the shelves in 2000. The evolution in Bluetooth has been swift since it came into being in the 1990s: at first limited in reach, it has become an all-encompassing standard that caters to multiple use cases.From wireless music to file sharing, from device pairing to household appliances and accessories, the standard covers a gamut of uses. Bluetooth can be a security risk Any technology that has a massive and ever- increasing market penetration will inevitably be on the radar of hackers and cybercriminals. Their focus is always on the number of peopleusing a specific technology, it’s reach, and leverage. It’s no surprisethen that there are plenty of security risks associated with Bluetooth. Bluetooth works by establishing a Wireless Personal Area Network (WPAN) to connect Bluetooth enabled devices with one another. Bluetooth-connected devices share data with one another and you want this data to be safe and secure. Moreover, you don’t want criminals to gain access to your Bluetooth-enabled devices. There is a critical need for us to be aware of the associated risks so that we can take steps definitive steps to protect us against Bluetooth attacks. Some common types of Bluetooth attacks: BlueJacking Yep, no prizes for guessing it is a combination of two words – Bluetooth and hijacking. This is a typeof attack in which a Bluetooth-enabled device hijacks another Bluetooth device to send spamadvertising. Imagine youare in a public place with the Bluetoothon your Imagine you are in a public place with the Bluetooth on your device switched on. There is a criminal at work in the public space with a BlueJacking device, and they pair thedevice with yours and starts to spend spam-styleadvertising messages. At face value, this problem sounds like an annoyance more than anything else, but what if one of these messages contains a malicious link? Or is a carefully crafted message that convinces you to share sensitive personalinformation?A BlueJacking attempt can go from an annoyance to a critical security issue.
  • 2. THE DAILY NEWS SATURDAY 22 September 2021 BlueSmacking (A DoS or denial-of-service attack) A DoS attack involves a server or device receiving a truckload of data packets, or even over-sized data packets it finds difficult to handle. The result is that thedevice shuts down or malfunctions. What if your Bluetooth device is considered important enough to launch a denial-of- service (DoS) attack against? This is not as farfetched as it sounds. Today, mobile devices are not just used for calling or sending messages. Phones, tablets, and laptops are being used to storeimportant information and execute programs that have a direct impact on a business-critical project. Now imagine a BlueSmacking attack against numerous such devices that are a part of a single organization. BlueSnarfing This is the more ‘frightening’ version of ‘BlueJacking’. While the latter sends data, theBlueSnarfing steals data. As in all attacks which aim to gain unauthorized access to data, you won’t realize someone has accessed your data until it is too late. Picture a scenario in which you are at the airport and having some free time on your hands before you board your flight, you decide to get some work done. Unbeknownst to you, the person sitting next to you is a hacker who is just waiting for an opportunity to BlueSnarf unsuspecting users such are yourself. If your Bluetooth is switched on, your device is paired clandestinely and thedata on your device is accessed, which can include emails, text messages, and much more. Eavesdropping We are living in a world where we are working from home and attending numerous business meetings throughout theday. Many of the headsets we use are Bluetooth enabled. Criminals can exploit vulnerabilities in such headsets and eavesdrop on your conversations. Here’s the really scary bit. Hackers can eavesdrop on theconversations you are having with the peoplearound you as well. This is the kind of breach of privacy that can result in bigger problems.
  • 3. THE DAILY NEWS SATURDAY 22 September 2021 The ‘opensesame’ bug Cybercriminals can also create a backdoor on your device or laptop using Bluetooth. Once a backdoor has been established,the attacker can have a field day as they can access all manner of sensitive information stored on this device. You won’t realize it, but a criminal can spy on all youractivities on the device. Imagine the potential for havoc. How do you protect yourself? Now that you know the security risks, how do you protect yourself?It’s not that difficult if you take the basic steps.  Always be very aware of where your device is. Do not misplace it or forget about where you have kept it. This is super important if you are working from a public space. Also, if you do lose your phone, make sure you can easily lock it remotely.  Get into the habit of not using Bluetooth to transfer sensitive information. If you do share important files, encrypt them first.  If you are not using your Bluetooth, turn it off. When you do this, you switch off a possiblecyberattack vector. Documentery made by:- Shravani S.Patil Class:- 9th A Roll no.:-12