How can you prevent bluejacking




















Simply changing up your passwords on a regular basis is often enough to provide sufficient protection, but adhering to basic password protocols is even better.

Your device should not passively accept pairing requests from either known or unknown contacts. By implementing something like Two-factor Authentication 2FA , you immediately make your active assent a necessity in whether your device connects with another device or not. This puts the initiative into your hands, and takes back control from the hacker.

Bluetooth attacks are fundamentally limited by physical space. One such safeguard is making sure that you never initiate a pairing of your device in public for the first time. Instead, always do this at home, or if you know it to be safe, at a place of work. Bluesnarfing is the kind of threat that comes to you. Save my name, email, and website in this browser for the next time I comment. March 7, How to Prevent a Bluesnarfing Attack Bluesnarfing is a type of network attack in which an attacker gains unauthorized access to a wireless device via a Bluetooth connection.

Do not accept pairing requests from unknown contacts Never accept a pairing request from a source you do not trust. Require approval for all connects Your device should not passively accept pairing requests from either known or unknown contacts.

This post was originally published on August 21, and has been updated for accuracy and comprehensiveness. Bluetooth is the technology that allows electronic devices like smartphones , tablets, portable speakers , digital assistants , wearable fitness trackers and home security equipment to wirelessly connect to each other through a network. Bluetooth is everywhere, especially in our homes. But, as this wireless technology continues to evolve, cyber attacks are becoming a major threat.

Almost every Bluetooth connected device is open to cyber attack. Fortunately, there are ways to avoid these risks when utilizing Bluetooth technology. Below, we explain the cyber risk and offer tips to properly secure your devices. While this adds a level of convenience and connectivity to everything we do, it also leaves us open to cyber threats. If your device is Bluetooth-enabled, it can be hacked.

There are a number of techniques hackers use to infiltrate Bluetooth-enabled devices and new vulnerabilities are discovered regularly. The most popular hacking methods are bluejacking, bluesnarfing and bluebugging. Cyber security should not be taken lightly. The older a phone's Bluetooth technology is, the easier the phone is to bluebug. Contact your phone's manufacturer if you are concerned about bluebugging. Several major cell-phone companies, including Nokia and Ericsson, have developed software "patches" that make it difficult for bluebuggers to hack into these older-model phones.

Turn off your phone's Bluetooth capability when you aren't using it. Bluebuggers can only make a connection when Bluetooth is enabled. Scan all incoming multimedia messages and electronic business cards for viruses. Bluebuggers often gain access to your phone by relaying such information to you.

Take advantage of the fact that no hacker can bluebug a phone beyond 30 feet. Move to a remote area, if possible, when using your phone's Bluetooth capabilities. Never hand your phone over to a stranger.



0コメント

  • 1000 / 1000