How secure is the Bluetooth technology from hacking?

Asked By 90 points N/A Posted on -
qa-featured
Is it possible for a malware to extract information from my mobile device? According to recent news reports a hacker can extract my personal data like chat history from my android phone without much resistance by the use of brute force. How safe is the Bluetooth technology and are there enough security measures to prevent such attacks?

 

SHARE
Answered By 0 points N/A #188994

How secure is the Bluetooth technology from hacking?

qa-featured

There may be chances of security attacks while using wireless protocols like Bluetooth. To make secure your device, first of all you should make your device “undiscoverable” which can be easily done in a moment of time. If you want to keep your Bluetooth turn on, then you better don’t download or install files from any unknown and suspicious sources. Verify all the incoming files transmissions and use passwords.

Answered By 590495 points N/A #310798

How secure is the Bluetooth technology from hacking?

qa-featured

Back in September 2017, a Bluetooth vulnerability was discovered that can be used to exploit hacked phones and laptops silently. Armis Security, an agentless IoT (Internet of Things) security platform that allows enterprise see and control any device or network, published the details of the new Bluetooth vulnerability which they dubbed “Blueborne” that can potentially expose millions of devices to remote attack.

Blueborne’s attack works by masquerading or disguising as a Bluetooth device and exploiting weaknesses in the protocol to deploy malicious codes, similar to the Broadcom Wi-Fi attack which was disclosed earlier last year. Since Bluetooth-enabled devices have high privileges in most operating systems, the attack can be launched without any input from the user.

With Blueborne, any possible target device doesn’t have to be paired with the malicious device or even be set in discoverable mode. Microsoft deployed a patch to fix the vulnerability in July last year while iPhones running on iOS 10 are immune to the attack. This leaves Android devices as the most vulnerable. On the other hand, there are several limitations to the attack.

Like for instance, since the attack requires Bluetooth connection, Blueborne can only target devices within range and only devices with Bluetooth turned on.

Related Questions