Aerosol Posted January 14, 2015 Report Posted January 14, 2015 ABSTRACTThere are lot of things around us to give comfort but we sometime misuse them.In this topic we would be covering how a Bluetooth is being hacked and causesecurity issue. The main objective of this presentation is about Bluetoothhacking, the impact and prevention. Further we will focus on how Bluetoothhacking is done, different categories of Bluetooth hack, threat a business canface and its prevention.When we hear term hacking, we usually think it’s attached with computer only.Now your computers are not only hacked but your Bluetooth can be hacked too.This is one of the big drawbacks of Bluetooth. There are different types ofhacking such as Bluejacking, Bluesnarfing, Bluebugging, Bluetoothing,Blueprinting etc. The purpose of this entire Bluetooth hacking is to hack yourphone and your privacy. Bluetooth hacking takes place because of securitylacking in Bluetooth technology. If someone hack your Bluetooth in that casehacker can steal your contacts, personal files, pictures, restore factory settingor they can use your phone for calling and using internet. Beside this they canaccess international mobile equipment identity number (IMEI), which they canuse for cloning your cell phone. When your cell phone is cloned then yourmessages can be sent to other numbers. It will impact the business world.Mobile, while providing great opportunity, also provides security and risks.Companies need to protect their consumers in order to remain credible andreliable, for this, selection of the appropriate security policies for allBluetooth capable devices will impact your business. This frequently includeshandheld devices owned by employees. To avoid the fraudulent use of thecorporate data, we need to follow some protocols: Keep BT in the disabledstate and device in non-discoverable mode. Use non regular patterns as PINkeys while pairing a device. Register your device at the Manufacturer site andinsure that security updates are installed regularly to protect from previouslyknown threat which had been rectified in new models. Proper security testingwill provide customer satisfaction as well as increase company’s businessRead more: http://www.larsentoubro.com/lntcorporate/common/ui_templates/pdf/Bluetooth%20hacking%20and%20its%20Prevention%202014.pdf Quote