SlideShare a Scribd company logo
1 of 3
THE DAILY NEWS
SATURDAY
22 September
2021
www.dailytechnologynews.com
Bluetooth Attacks and Security Tips – Awareness Results in
Better Protection
The history of Bluetooth is quite recent – the 1990s, to be
exact. Ericsson, a Swedish multinational active in the
networking and telecommunications domain, developed
Bluetooth. The name ‘Bluetooth’ comes from a renowned
10th century Danish King, Harald “Bluetooth” Gormsson,
responsible for uniting Norway and Denmark. The
Bluetooth logo is a combination of Harald’s initials.
Dr. Jaap Haarsten is the man credited with conceiving the
idea for Bluetooth, and while it was invented in 1994, the
first Bluetooth enabled consumer product was only
launched five years later in 1999. This a was a hands-free
mobile headset,and its launch was followed by the launch
of Bluetooth-enabled dongles and mice, with the first
Bluetooth-equipped mobile phone hitting the shelves in
2000.
The evolution in Bluetooth has been swift since it
came into being in the 1990s: at first limited in
reach, it has become an all-encompassing
standard that caters to multiple use cases.From
wireless music to file sharing, from device
pairing to household appliances and accessories,
the standard covers a gamut of uses.
Bluetooth can be a security risk
Any technology that has a massive and ever-
increasing market penetration will inevitably be
on the radar of hackers and cybercriminals. Their
focus is always on the number of peopleusing a
specific technology, it’s reach, and leverage. It’s
no surprisethen that there are plenty of security
risks associated with Bluetooth.
Bluetooth works by establishing a Wireless Personal Area
Network (WPAN) to connect Bluetooth enabled devices
with one another. Bluetooth-connected devices share data
with one another and you want this data to be safe and
secure. Moreover, you don’t want criminals to gain access
to your Bluetooth-enabled devices. There is a critical need
for us to be aware of the associated risks so that we can take
steps definitive steps to protect us against Bluetooth attacks.
Some common types of Bluetooth attacks:
BlueJacking
Yep, no prizes for guessing it is a combination of two
words – Bluetooth and hijacking. This is a typeof attack
in which a Bluetooth-enabled device hijacks another
Bluetooth device to send spamadvertising.
Imagine youare in a public place with the Bluetoothon your
Imagine you are in a public place with the Bluetooth on your
device switched on. There is a criminal at work in the public
space with a BlueJacking device, and they pair thedevice with
yours and starts to spend spam-styleadvertising messages. At
face value, this problem sounds like an annoyance more than
anything else, but what if one of these messages contains a
malicious link? Or is a carefully crafted message that convinces
you to share sensitive personalinformation?A BlueJacking
attempt can go from an annoyance to a critical security issue.
THE DAILY NEWS
SATURDAY
22 September
2021
BlueSmacking (A DoS or denial-of-service attack)
A DoS attack involves a server or device receiving a truckload of data
packets, or even over-sized data packets it finds difficult to handle. The
result is that thedevice shuts down or malfunctions. What if your
Bluetooth device is considered important enough to launch a denial-of-
service (DoS) attack against?
This is not as farfetched as it sounds. Today,
mobile devices are not just used for calling or
sending messages. Phones, tablets, and laptops are
being used to storeimportant information and
execute programs that have a direct impact on a
business-critical project. Now imagine a
BlueSmacking attack against numerous such
devices that are a part of a single organization.
BlueSnarfing
This is the more ‘frightening’ version of ‘BlueJacking’. While the latter
sends data, theBlueSnarfing steals data. As in all attacks which aim to
gain unauthorized access to data, you won’t realize someone has
accessed your data until it is too late.
Picture a scenario in which you are at the airport and having some free
time on your hands before you board your flight, you decide to get some
work done.
Unbeknownst to you, the person sitting next
to you is a hacker who is just waiting for an
opportunity to BlueSnarf unsuspecting users
such are yourself. If your Bluetooth is
switched on, your device is paired
clandestinely and thedata on your device is
accessed, which can include emails, text
messages, and much more.
Eavesdropping
We are living in a world where we are working from home and
attending numerous business meetings throughout theday. Many of the
headsets we use are Bluetooth enabled. Criminals can exploit
vulnerabilities in such headsets and eavesdrop on your conversations.
Here’s the really scary bit. Hackers can
eavesdrop on theconversations you are
having with the peoplearound you as well.
This is the kind of breach of privacy that
can result in bigger problems.
THE DAILY NEWS
SATURDAY
22 September
2021
The ‘opensesame’ bug
Cybercriminals can also create a backdoor on your device or laptop using Bluetooth. Once a backdoor has been
established,the attacker can have a field day as they can access all manner of sensitive information stored on this
device. You won’t realize it, but a criminal can spy on all youractivities on the device. Imagine the potential for
havoc.
How do you protect yourself?
Now that you know the security risks, how do you protect yourself?It’s not that difficult if you take the basic steps.
 Always be very aware of where your device is. Do not misplace it or forget about where you have kept it. This is
super important if you are working from a public space. Also, if you do lose your phone, make sure you can
easily lock it remotely.
 Get into the habit of not using Bluetooth to transfer sensitive information. If you do share important files, encrypt
them first.
 If you are not using your Bluetooth, turn it off. When you do this, you switch off a possiblecyberattack vector.
Documentery made by:-
Shravani S.Patil
Class:- 9th
A Roll no.:-12

More Related Content

What's hot

Cyber Warfare - Milan 2015
Cyber Warfare - Milan 2015Cyber Warfare - Milan 2015
Cyber Warfare - Milan 2015Marco Pozzato
 
ISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloJohn Intindolo
 
FUTURE SCHLOCK Joyce Schwarz LA FUTURISTS TALK
FUTURE SCHLOCK Joyce Schwarz LA FUTURISTS TALKFUTURE SCHLOCK Joyce Schwarz LA FUTURISTS TALK
FUTURE SCHLOCK Joyce Schwarz LA FUTURISTS TALKJoyce Schwarz
 
Lesson2.9 n u2l6 public keys
Lesson2.9 n u2l6 public keysLesson2.9 n u2l6 public keys
Lesson2.9 n u2l6 public keysLexume1
 
עומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגת
עומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגתעומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגת
עומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגתDr. Anat Klumel
 
Mobile phones are nuisance
Mobile phones are nuisanceMobile phones are nuisance
Mobile phones are nuisanceAnis Zulaikha
 
Evolution of information security
Evolution of information securityEvolution of information security
Evolution of information securityAnton Shvydkyi
 
Do’s & don’ts of computer security rough
Do’s & don’ts of computer security  roughDo’s & don’ts of computer security  rough
Do’s & don’ts of computer security roughNathaniel (Nate) Tuenge
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivismBilal Ali
 
Earthmouse: Mobile Guardian
Earthmouse: Mobile GuardianEarthmouse: Mobile Guardian
Earthmouse: Mobile Guardianearthmouse
 
Information security consciousness
Information security consciousnessInformation security consciousness
Information security consciousnessCiarán Mc Mahon
 
Stop in the name of norton
Stop in the name of nortonStop in the name of norton
Stop in the name of nortonspkiely
 

What's hot (18)

Cyber Warfare - Milan 2015
Cyber Warfare - Milan 2015Cyber Warfare - Milan 2015
Cyber Warfare - Milan 2015
 
Mobileteleseczabout
MobileteleseczaboutMobileteleseczabout
Mobileteleseczabout
 
Bluetooth Hacking
Bluetooth HackingBluetooth Hacking
Bluetooth Hacking
 
ISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloISSC456_Final_J_Intindolo
ISSC456_Final_J_Intindolo
 
FUTURE SCHLOCK Joyce Schwarz LA FUTURISTS TALK
FUTURE SCHLOCK Joyce Schwarz LA FUTURISTS TALKFUTURE SCHLOCK Joyce Schwarz LA FUTURISTS TALK
FUTURE SCHLOCK Joyce Schwarz LA FUTURISTS TALK
 
Lesson2.9 n u2l6 public keys
Lesson2.9 n u2l6 public keysLesson2.9 n u2l6 public keys
Lesson2.9 n u2l6 public keys
 
עומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגת
עומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגתעומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגת
עומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגת
 
Mobile phones are nuisance
Mobile phones are nuisanceMobile phones are nuisance
Mobile phones are nuisance
 
Crime & technology
Crime & technologyCrime & technology
Crime & technology
 
Cscs (4)
Cscs (4)Cscs (4)
Cscs (4)
 
Evolution of information security
Evolution of information securityEvolution of information security
Evolution of information security
 
Do’s & don’ts of computer security rough
Do’s & don’ts of computer security  roughDo’s & don’ts of computer security  rough
Do’s & don’ts of computer security rough
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivism
 
Smartphone safety
Smartphone safetySmartphone safety
Smartphone safety
 
Earthmouse: Mobile Guardian
Earthmouse: Mobile GuardianEarthmouse: Mobile Guardian
Earthmouse: Mobile Guardian
 
Information security consciousness
Information security consciousnessInformation security consciousness
Information security consciousness
 
It hotspot shield new
It hotspot shield newIt hotspot shield new
It hotspot shield new
 
Stop in the name of norton
Stop in the name of nortonStop in the name of norton
Stop in the name of norton
 

Similar to Bluetooth Security Risks and Tips to Protect Your Devices

Bluejacking by Niharika Mundra
Bluejacking  by Niharika MundraBluejacking  by Niharika Mundra
Bluejacking by Niharika MundraNiki mundra
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportROHIT SAGAR
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?acijjournal
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threatAli J
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxHAYDEECAYDA
 
11Wireless SecurityHere is a sample research paper that I .docx
11Wireless SecurityHere is a sample research paper that I .docx11Wireless SecurityHere is a sample research paper that I .docx
11Wireless SecurityHere is a sample research paper that I .docxhyacinthshackley2629
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentationankit680
 
Cyber Security: Stalking Prey: An RF Hackers Perspective
Cyber Security: Stalking Prey: An RF Hackers Perspective Cyber Security: Stalking Prey: An RF Hackers Perspective
Cyber Security: Stalking Prey: An RF Hackers Perspective Signals Defense, LLC
 
Bluejacking sadhana
Bluejacking sadhanaBluejacking sadhana
Bluejacking sadhanaSadhana28
 

Similar to Bluetooth Security Risks and Tips to Protect Your Devices (20)

Blue jacking
Blue jackingBlue jacking
Blue jacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Blue Jacking
Blue Jacking Blue Jacking
Blue Jacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking by Niharika Mundra
Bluejacking  by Niharika MundraBluejacking  by Niharika Mundra
Bluejacking by Niharika Mundra
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
blue-JACKING.pptx
blue-JACKING.pptxblue-JACKING.pptx
blue-JACKING.pptx
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threat
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
 
11Wireless SecurityHere is a sample research paper that I .docx
11Wireless SecurityHere is a sample research paper that I .docx11Wireless SecurityHere is a sample research paper that I .docx
11Wireless SecurityHere is a sample research paper that I .docx
 
Device Hacking
Device HackingDevice Hacking
Device Hacking
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
 
Cyber Security: Stalking Prey: An RF Hackers Perspective
Cyber Security: Stalking Prey: An RF Hackers Perspective Cyber Security: Stalking Prey: An RF Hackers Perspective
Cyber Security: Stalking Prey: An RF Hackers Perspective
 
Bluejacking sadhana
Bluejacking sadhanaBluejacking sadhana
Bluejacking sadhana
 
Blue Jacking
Blue JackingBlue Jacking
Blue Jacking
 

More from Shravani Patil

Taekwondo - The Korean Martial Art.ppsx
Taekwondo - The Korean Martial Art.ppsxTaekwondo - The Korean Martial Art.ppsx
Taekwondo - The Korean Martial Art.ppsxShravani Patil
 
Tabla Presentation.pptx
Tabla Presentation.pptxTabla Presentation.pptx
Tabla Presentation.pptxShravani Patil
 
India's Famous Hindi Author.pptx
India's Famous Hindi Author.pptxIndia's Famous Hindi Author.pptx
India's Famous Hindi Author.pptxShravani Patil
 
Poverty As A Challenge.pptx
Poverty As A Challenge.pptxPoverty As A Challenge.pptx
Poverty As A Challenge.pptxShravani Patil
 
Aves Presentation for class 9.pptx
Aves Presentation for class 9.pptxAves Presentation for class 9.pptx
Aves Presentation for class 9.pptxShravani Patil
 
𝑰𝒏𝒇𝒐𝒓𝒎𝒂𝒕𝒊𝒐𝒏 𝒐𝒇 𝑶𝒅𝒊𝒔𝒔𝒊 𝑪𝒍𝒂𝒔𝒔𝒊𝒄𝒂𝒍 𝑴𝒖𝒔𝒊𝒄
𝑰𝒏𝒇𝒐𝒓𝒎𝒂𝒕𝒊𝒐𝒏 𝒐𝒇 𝑶𝒅𝒊𝒔𝒔𝒊 𝑪𝒍𝒂𝒔𝒔𝒊𝒄𝒂𝒍 𝑴𝒖𝒔𝒊𝒄𝑰𝒏𝒇𝒐𝒓𝒎𝒂𝒕𝒊𝒐𝒏 𝒐𝒇 𝑶𝒅𝒊𝒔𝒔𝒊 𝑪𝒍𝒂𝒔𝒔𝒊𝒄𝒂𝒍 𝑴𝒖𝒔𝒊𝒄
𝑰𝒏𝒇𝒐𝒓𝒎𝒂𝒕𝒊𝒐𝒏 𝒐𝒇 𝑶𝒅𝒊𝒔𝒔𝒊 𝑪𝒍𝒂𝒔𝒔𝒊𝒄𝒂𝒍 𝑴𝒖𝒔𝒊𝒄Shravani Patil
 
Conservation of water ppt by shravani patil
Conservation of water ppt by shravani patilConservation of water ppt by shravani patil
Conservation of water ppt by shravani patilShravani Patil
 

More from Shravani Patil (8)

Taekwondo - The Korean Martial Art.ppsx
Taekwondo - The Korean Martial Art.ppsxTaekwondo - The Korean Martial Art.ppsx
Taekwondo - The Korean Martial Art.ppsx
 
Sun Temple.pptx
Sun Temple.pptxSun Temple.pptx
Sun Temple.pptx
 
Tabla Presentation.pptx
Tabla Presentation.pptxTabla Presentation.pptx
Tabla Presentation.pptx
 
India's Famous Hindi Author.pptx
India's Famous Hindi Author.pptxIndia's Famous Hindi Author.pptx
India's Famous Hindi Author.pptx
 
Poverty As A Challenge.pptx
Poverty As A Challenge.pptxPoverty As A Challenge.pptx
Poverty As A Challenge.pptx
 
Aves Presentation for class 9.pptx
Aves Presentation for class 9.pptxAves Presentation for class 9.pptx
Aves Presentation for class 9.pptx
 
𝑰𝒏𝒇𝒐𝒓𝒎𝒂𝒕𝒊𝒐𝒏 𝒐𝒇 𝑶𝒅𝒊𝒔𝒔𝒊 𝑪𝒍𝒂𝒔𝒔𝒊𝒄𝒂𝒍 𝑴𝒖𝒔𝒊𝒄
𝑰𝒏𝒇𝒐𝒓𝒎𝒂𝒕𝒊𝒐𝒏 𝒐𝒇 𝑶𝒅𝒊𝒔𝒔𝒊 𝑪𝒍𝒂𝒔𝒔𝒊𝒄𝒂𝒍 𝑴𝒖𝒔𝒊𝒄𝑰𝒏𝒇𝒐𝒓𝒎𝒂𝒕𝒊𝒐𝒏 𝒐𝒇 𝑶𝒅𝒊𝒔𝒔𝒊 𝑪𝒍𝒂𝒔𝒔𝒊𝒄𝒂𝒍 𝑴𝒖𝒔𝒊𝒄
𝑰𝒏𝒇𝒐𝒓𝒎𝒂𝒕𝒊𝒐𝒏 𝒐𝒇 𝑶𝒅𝒊𝒔𝒔𝒊 𝑪𝒍𝒂𝒔𝒔𝒊𝒄𝒂𝒍 𝑴𝒖𝒔𝒊𝒄
 
Conservation of water ppt by shravani patil
Conservation of water ppt by shravani patilConservation of water ppt by shravani patil
Conservation of water ppt by shravani patil
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

Bluetooth Security Risks and Tips to Protect Your Devices

  • 1. THE DAILY NEWS SATURDAY 22 September 2021 www.dailytechnologynews.com Bluetooth Attacks and Security Tips – Awareness Results in Better Protection The history of Bluetooth is quite recent – the 1990s, to be exact. Ericsson, a Swedish multinational active in the networking and telecommunications domain, developed Bluetooth. The name ‘Bluetooth’ comes from a renowned 10th century Danish King, Harald “Bluetooth” Gormsson, responsible for uniting Norway and Denmark. The Bluetooth logo is a combination of Harald’s initials. Dr. Jaap Haarsten is the man credited with conceiving the idea for Bluetooth, and while it was invented in 1994, the first Bluetooth enabled consumer product was only launched five years later in 1999. This a was a hands-free mobile headset,and its launch was followed by the launch of Bluetooth-enabled dongles and mice, with the first Bluetooth-equipped mobile phone hitting the shelves in 2000. The evolution in Bluetooth has been swift since it came into being in the 1990s: at first limited in reach, it has become an all-encompassing standard that caters to multiple use cases.From wireless music to file sharing, from device pairing to household appliances and accessories, the standard covers a gamut of uses. Bluetooth can be a security risk Any technology that has a massive and ever- increasing market penetration will inevitably be on the radar of hackers and cybercriminals. Their focus is always on the number of peopleusing a specific technology, it’s reach, and leverage. It’s no surprisethen that there are plenty of security risks associated with Bluetooth. Bluetooth works by establishing a Wireless Personal Area Network (WPAN) to connect Bluetooth enabled devices with one another. Bluetooth-connected devices share data with one another and you want this data to be safe and secure. Moreover, you don’t want criminals to gain access to your Bluetooth-enabled devices. There is a critical need for us to be aware of the associated risks so that we can take steps definitive steps to protect us against Bluetooth attacks. Some common types of Bluetooth attacks: BlueJacking Yep, no prizes for guessing it is a combination of two words – Bluetooth and hijacking. This is a typeof attack in which a Bluetooth-enabled device hijacks another Bluetooth device to send spamadvertising. Imagine youare in a public place with the Bluetoothon your Imagine you are in a public place with the Bluetooth on your device switched on. There is a criminal at work in the public space with a BlueJacking device, and they pair thedevice with yours and starts to spend spam-styleadvertising messages. At face value, this problem sounds like an annoyance more than anything else, but what if one of these messages contains a malicious link? Or is a carefully crafted message that convinces you to share sensitive personalinformation?A BlueJacking attempt can go from an annoyance to a critical security issue.
  • 2. THE DAILY NEWS SATURDAY 22 September 2021 BlueSmacking (A DoS or denial-of-service attack) A DoS attack involves a server or device receiving a truckload of data packets, or even over-sized data packets it finds difficult to handle. The result is that thedevice shuts down or malfunctions. What if your Bluetooth device is considered important enough to launch a denial-of- service (DoS) attack against? This is not as farfetched as it sounds. Today, mobile devices are not just used for calling or sending messages. Phones, tablets, and laptops are being used to storeimportant information and execute programs that have a direct impact on a business-critical project. Now imagine a BlueSmacking attack against numerous such devices that are a part of a single organization. BlueSnarfing This is the more ‘frightening’ version of ‘BlueJacking’. While the latter sends data, theBlueSnarfing steals data. As in all attacks which aim to gain unauthorized access to data, you won’t realize someone has accessed your data until it is too late. Picture a scenario in which you are at the airport and having some free time on your hands before you board your flight, you decide to get some work done. Unbeknownst to you, the person sitting next to you is a hacker who is just waiting for an opportunity to BlueSnarf unsuspecting users such are yourself. If your Bluetooth is switched on, your device is paired clandestinely and thedata on your device is accessed, which can include emails, text messages, and much more. Eavesdropping We are living in a world where we are working from home and attending numerous business meetings throughout theday. Many of the headsets we use are Bluetooth enabled. Criminals can exploit vulnerabilities in such headsets and eavesdrop on your conversations. Here’s the really scary bit. Hackers can eavesdrop on theconversations you are having with the peoplearound you as well. This is the kind of breach of privacy that can result in bigger problems.
  • 3. THE DAILY NEWS SATURDAY 22 September 2021 The ‘opensesame’ bug Cybercriminals can also create a backdoor on your device or laptop using Bluetooth. Once a backdoor has been established,the attacker can have a field day as they can access all manner of sensitive information stored on this device. You won’t realize it, but a criminal can spy on all youractivities on the device. Imagine the potential for havoc. How do you protect yourself? Now that you know the security risks, how do you protect yourself?It’s not that difficult if you take the basic steps.  Always be very aware of where your device is. Do not misplace it or forget about where you have kept it. This is super important if you are working from a public space. Also, if you do lose your phone, make sure you can easily lock it remotely.  Get into the habit of not using Bluetooth to transfer sensitive information. If you do share important files, encrypt them first.  If you are not using your Bluetooth, turn it off. When you do this, you switch off a possiblecyberattack vector. Documentery made by:- Shravani S.Patil Class:- 9th A Roll no.:-12