Three distinct types of Bluetooth Hacking:

Bluejacking
Mainly a nuisance, but has the potential to be malicious

Bluesnarfing
A more serious attack that can gain access to passwords, email and photos.
Information gained from this type of attack can be used for identity theft.
Does no leave any trace.

Bluebugging
The most dangerous type. It can place a backdoor in your device, allowing access at any time. They can view what is on your screen, and listen to your phone calls. Victims are completely unaware until someone e.g. the bank alerts them to strange activity from their device.

Once your device is bluebugged, a hacker can spy on you and access your private data. In some cases, a cybercriminal may use this information to impersonate you.

Car whispering
Is a Bluetooth security vulnerability that targets car radios with Bluetooth capabilities. Hackers use this attack to eavesdrop on conversations and phone calls that take place inside the car.

How to Protect Yourself From Bluetooth Hacking

  • Turn Bluetooth Off When It Is not in use
  • Keep drivers updated
  • Avoid Pairing in public
  • Deny pairing requests from unknown devices or people
  • Select The ‘Not Discoverable’ Setting

By turning off Discoverable mode, you will no longer be visible to nearby devices.

Leave a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.