Bluetooth Security Technology

With wireless networking comes the concern of security. How can you secure your devices connected by Bluetooth technology? How can you protect the information you send on your devices from being intercepted by hackers and unauthorized users?

Bluetooth does offer a variety of security modes, and each Bluetooth-enable device comes with one of these modes. In general to protect your Bluetooth connections, user can create a list of "trusted devices". Users can exchange data between the selected devices without asking for permission. However, when unrecognized devices try to send information to your device, the users can accept or deny information.

 

Bluetooth Comes with Security Options

Bluetooth offers service-level protection and device-level protection to secure your Bluetooth-enabled devices. The authorization and identification procedures that comes with Bluetooth's service-level protection, restricts anyone other than the registered Bluetooth user from using the service. It also lets the user to accept or reject a file or incoming data.

If you tend to use your Bluetooth mainly to connect your personal devices at home and not for socializing with other Bluetooth equipped friends, you can simply set your Bluetooth to the "non-discoverable" mode. This prevents other Bluetooth devices and users from connecting to your Bluetooth. This is one way you use Bluetooth's device-level protection.

Bluetooth's authorization and authentication processes often filters out malicious files from opening onto your device. Since you have to first accept the harmful file from the unknown user, and then agree to install it. This two step process, often prevents security breaches.

Bluetooth Security Concerns

However, Bluetooth like any other wireless networking has some security glitches. These glitches include: bluejacking, bluebugging and Car Whispers.

Bluejacking occurs when a Bluetooth user sends a generic text message or business card to other Bluetooth users within the proximity of 32 feet. If the user doesn't recognize that the sender may be harmful, he may accept the message. So the sender will be added to his contact list. After the unknown sender gets on the user's contact list, they can send another message automatically to the user, without having the user approve it.

Bluebugging is more serious and occurs when a hacker accesses a user's phone and can place calls and send text message to the user's contacts without the user knowing.

The piece of software called Car Whisperer lets hackers transmit and receive audio from a Bluetooth-enabled car stereo.

 

(0 Comments)
Log in or sign up to comment.

Post a comment

Log in or sign up to comment.
Identity theft comes in many forms.

A person\92s identity can be 'borrowed' for the purpose of creating fictional credit cards or a person\92s entire identity can be usurped to the point where they can have difficulty proving that they really are who they claim to be.

Up to 18% of identity theft victims take as long as four years to realize that their identity has been stolen.

There are many ways to protect your personal identity and many steps you can take to prevent your identity from being stolen:

*Never give out unnecessary personal information
*Never provide bank details or social security numbers over the Internet
*Always remain aware of who is standing behind you when you type in your personal credit codes at ATM machines and at supermarket checkout swipe machines.