Jump to content
Aerosol

Bluetooth hacking and its Prevention

Recommended Posts

ABSTRACT

There are lot of things around us to give comfort but we sometime misuse them.

In this topic we would be covering how a Bluetooth is being hacked and cause

security issue. The main objective of this presentation is about Bluetooth

hacking, the impact and prevention. Further we will focus on how Bluetooth

hacking is done, different categories of Bluetooth hack, threat a business can

face and its prevention.

When we hear term hacking, we usually think it’s attached with computer only.

Now your computers are not only hacked but your Bluetooth can be hacked too.

This is one of the big drawbacks of Bluetooth. There are different types of

hacking such as Bluejacking, Bluesnarfing, Bluebugging, Bluetoothing,

Blueprinting etc. The purpose of this entire Bluetooth hacking is to hack your

phone and your privacy. Bluetooth hacking takes place because of security

lacking in Bluetooth technology. If someone hack your Bluetooth in that case

hacker can steal your contacts, personal files, pictures, restore factory setting

or they can use your phone for calling and using internet. Beside this they can

access international mobile equipment identity number (IMEI), which they can

use for cloning your cell phone. When your cell phone is cloned then your

messages can be sent to other numbers. It will impact the business world.

Mobile, while providing great opportunity, also provides security and risks.

Companies need to protect their consumers in order to remain credible and

reliable, for this, selection of the appropriate security policies for all

Bluetooth capable devices will impact your business. This frequently includes

handheld devices owned by employees. To avoid the fraudulent use of the

corporate data, we need to follow some protocols: Keep BT in the disabled

state and device in non-discoverable mode. Use non regular patterns as PIN

keys while pairing a device. Register your device at the Manufacturer site and

insure that security updates are installed regularly to protect from previously

known threat which had been rectified in new models. Proper security testing

will provide customer satisfaction as well as increase company’s business

Read more: http://www.larsentoubro.com/lntcorporate/common/ui_templates/pdf/Bluetooth%20hacking%20and%20its%20Prevention%202014.pdf

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...