Software ReviewsBluetooth ReviewBluetooth Security Technology

Bluetooth Security Technology

With wireless networking comes the concern of security. How can you secure your devices connected by Bluetooth technology? How can you protect the information you send on your devices from being intercepted by hackers and unauthorized users?

Bluetooth does offer a variety of security modes, and each Bluetooth-enable device comes with one of these modes. In general to protect your Bluetooth connections, user can create a list of “trusted devices”. Users can exchange data between the selected devices without asking for permission. However, when unrecognized devices try to send information to your device, the users can accept or deny information.

 

Bluetooth Comes with Security Options

Bluetooth offers service-level protection and device-level protection to secure your Bluetooth-enabled devices. The authorization and identification procedures that comes with Bluetooth’s service-level protection, restricts anyone other than the registered Bluetooth user from using the service. It also lets the user to accept or reject a file or incoming data.

If you tend to use your Bluetooth mainly to connect your personal devices at home and not for socializing with other Bluetooth equipped friends, you can simply set your Bluetooth to the “non-discoverable” mode. This prevents other Bluetooth devices and users from connecting to your Bluetooth. This is one way you use Bluetooth’s device-level protection.

Bluetooth’s authorization and authentication processes often filters out malicious files from opening onto your device. Since you have to first accept the harmful file from the unknown user, and then agree to install it. This two step process, often prevents security breaches.

Bluetooth Security Concerns

However, Bluetooth like any other wireless networking has some security glitches. These glitches include: bluejacking, bluebugging and Car Whispers.

Bluejacking occurs when a Bluetooth user sends a generic text message or business card to other Bluetooth users within the proximity of 32 feet. If the user doesn’t recognize that the sender may be harmful, he may accept the message. So the sender will be added to his contact list. After the unknown sender gets on the user’s contact list, they can send another message automatically to the user, without having the user approve it.

Bluebugging is more serious and occurs when a hacker accesses a user’s phone and can place calls and send text message to the user’s contacts without the user knowing.

The piece of software called Car Whisperer lets hackers transmit and receive audio from a Bluetooth-enabled car stereo.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Subscribe Today

GET EXCLUSIVE FULL ACCESS TO PREMIUM CONTENT

SUPPORT NONPROFIT JOURNALISM

EXPERT ANALYSIS OF AND EMERGING TRENDS IN CHILD WELFARE AND JUVENILE JUSTICE

TOPICAL VIDEO WEBINARS

Get unlimited access to our EXCLUSIVE Content and our archive of subscriber stories.

Exclusive content

- Advertisement -Newspaper WordPress Theme

Latest article

More article

- Advertisement -Newspaper WordPress Theme