Main menu

Pages

Bluetooth | the new threat 

keep your online life secure by avoiding Bluetooth threat





Communication via Bluetooth is one of the technologies that was considered to be extinct soon, considering that it embodies an underdeveloped technology. But what we notice at the present time is the development of Bluetooth periodically to meet the needs of its users through many devices that we use today in conjunction with the phone such as wearable things or headphones, which indicates that it is a technology that is still recording its presence. But our conversation today will be limited to hacking methods And the danger that threatens us through it. The most important question is

is there the possibility of launching hacking attacks via Bluetooth for phones and computers?

Quick information

Bluetooth is a technology that enables you to connect via the phone to another device that supports this feature, such as headphones or watches. Although the data transfer speed is somewhat modest, it provides you with advantages such as connecting to more than one device in the latest version

Bluetooth's attacks are divided into three main attacks

1- Bluejacking

It is considered the weakest in the circle, the least harmful, and the most widespread, especially for vulnerable people, and its principle depends on sending unwanted messages, such as sending pictures or videos that violate the moral level, alienating the person and disturbing the public comfort.

2-Bluesnarfing

It is one of the most dangerous attacks, the most complex and the most harmful, because in short it targets the private data on the phone, and even it is able to access your e-mail and steal passwords and data saved on the same phone and the greatest harm is that it can target the victim at a more distance From 300 meters, despite knowing that the Bluetooth range is only 10 meters, but thanks to the high technologies that are used in such a method of penetration, it is possible to target the victim 300 meters away and steal his data without knowing him. Another matter that increases the risk of this technology by penetration is that the people supervising it are very professional and professional, as a back gateway is opened to the device that enables them to fully control it and reach the limit of responding to text messages and calls and blocking some of them from the user and all this happens without knowing the user except In the event that the hacking process is tracked through a competent security company

3-Blueboard

It is considered one of the most intelligent technologies as it has the ability to access the victim's phone without pairing the attacker's phone or connecting it via Bluetooth as well. Although the victim has hidden his appearance on the Bluetooth technology, the hacker can find his device and the stronger and more intelligent is that through this method he can send malicious software through the air and settles on any Bluetooth-enabled device and here lies the strength of this technology, through which companies and individuals are targeted alike, as it is considered one of the attacks specialized in electronic espionage. And often this technology is used to steal data from a group of computers for a specific company and spread viruses for ransomware, as accessing a single device entitles them to access them.

How can these attacks be avoided?

1-Subject awareness

Most of the attacks are based on the individual's awareness of the subject of these dangerous techniques and being very wary of them, as all I was aware of any movement you take, the less damage is

2-Security updates

Make sure to do all the phone updates, especially the security ones, which reach many devices almost every month

3-Pay attention to the Bluetooth signal

Make sure to turn off the signal after the end of its use, or at least hide it, especially in public places, even when connected to the headphones or smartwatch

reactions

Comments