Bluetooth

Course- Cyber >

Bluetooth has become a de-facto standard for low power, short-range wireless communications and it is extensively found in electronic devices. Early applications of Bluetooth were found in wireless keyboards and pointing devices such as a mouse. his has expanded to include other devices (such as printers and scanners – many of which also support WiFi such as headphones, loudspeakers, etc.

 

he most frequent use of Bluetooth is in mobile devices such as smartphones and tablets and the environments where these are used – for example enabling hand free phone calls while driving a car.

 

Why is this an issue?

While considerable attention has been given to security features in Bluetooth, the emergence of Internet enabled appliances and the Internet Of things make Bluetooth an essential protocol over which you – as an individual – may wish to exercise control.

A key feature of Bluetooth is that while appliances may exchange data and recognize each other, in theory at least, they require an individual user to intervene to pair the appliances. However like with most security vulnerabilities it is also important that the end users be aware of what they are allowing to run in their devices. Hackers create tools to compromise vulnerable devices. Bluetooth has been hacked and known attacks included processes called bluejacking, bluesnaring, bluebagging and bluetoothing. Several hacking tools are readily available if you know where to look.

 

The potential for interfering with appliances – cars that drive themselves, heart pacemakers, insulin pumps and other medical implantable devices, surgery robots, electronic locks for home use and so- called “smart” appliances are all potential targets.

 

What you should do about it

Use a search engine to learn more about the various ways in which Bluetooth can be compromised.

 

  • Keep Bluetooth of when you are not using it and make sure you are pairing with known devices whenever you need t
  • Monitor devices and links for unauthorized Bluetooth activit
  • Make devices discoverable (visible to other Bluetooth devices) only if/when absolutely necessar
  • Make devices connectable (capable of accepting and completing incoming connection requests) only if/when absolutely necessary and only until the required connection is established.
  • Pair Bluetooth devices in a secure area using long, randomly generated passk Never enter passkeys when unexpectedly prompted for them.
  • Maintain physical control of devices at all Remove lost or stolen devices from paired device lists.
  • Use device firewalls, regularly patch Bluetooth devices, and keep device anti-virus software up to d
  • Comply with all applicable corporate directives, policies, regulations, and guidan