How secure is the Bluetooth technology from hacking?
There may be chances of security attacks while using wireless protocols like Bluetooth. To make secure your device, first of all you should make your device “undiscoverable” which can be easily done in a moment of time. If you want to keep your Bluetooth turn on, then you better don’t download or install files from any unknown and suspicious sources. Verify all the incoming files transmissions and use passwords.
How secure is the Bluetooth technology from hacking?
Back in September 2017, a Bluetooth vulnerability was discovered that can be used to exploit hacked phones and laptops silently. Armis Security, an agentless IoT (Internet of Things) security platform that allows enterprise see and control any device or network, published the details of the new Bluetooth vulnerability which they dubbed “Blueborne” that can potentially expose millions of devices to remote attack.
Blueborne’s attack works by masquerading or disguising as a Bluetooth device and exploiting weaknesses in the protocol to deploy malicious codes, similar to the Broadcom Wi-Fi attack which was disclosed earlier last year. Since Bluetooth-enabled devices have high privileges in most operating systems, the attack can be launched without any input from the user.
With Blueborne, any possible target device doesn’t have to be paired with the malicious device or even be set in discoverable mode. Microsoft deployed a patch to fix the vulnerability in July last year while iPhones running on iOS 10 are immune to the attack. This leaves Android devices as the most vulnerable. On the other hand, there are several limitations to the attack.
Like for instance, since the attack requires Bluetooth connection, Blueborne can only target devices within range and only devices with Bluetooth turned on.