Ready to Start Your Career?

By: Jessica
July 29, 2018
Bluetooth Security Risks
By: Jessica
July 29, 2018

By: Jessica
July 29, 2018

Blueborne
Blueborne is an attack vector that was revealed by the security firm Armis in 2017. Endangering desktop, mobile, and IoT operating systems like Windows, Android, iOS, and Linux, this vector invades devices via Bluetooth by using identified vulnerabilities in devices. Blueborne attacks do not require pairing nor do they require devices to be set in discoverable mode. Once attackers successfully infiltrate a Bluetooth device, they can launch dangerous plots like Man-in-the-Middle attacks or complete takeovers of devices.Bluebugging
In bluebugging, attackers take control of Bluetooth devices without the user’s knowledge. Bluebuggers target devices that are in discoverable mode, and older devices with out-of-date firmware are especially susceptible. Once thieves gain control over a device, they can access sensitive information like a victim’s contacts, photographs, and more.Bluejacking
A very common type of Bluetooth attack, bluejacking happens when unsolicited messages, typically text messages with advertisements, are sent to discoverable Bluetooth devices. More of a nuisance than an actual danger, bluejacking is often used to send spam messages to people, and the sender of these messages does not gain control over the recipient’s device.Bluesnarfing
Bluesnarfing is digital information theft that is carried out by an attacker who obtains unauthorized access to a victim’s device, usually thorough bluebugging. Bluesnarfing thieves usually steal data like a victim’s contacts, text messages, and passwords.Tips
Fortunately, the steps you can take to reduce the chance of exposure to such cyber dangers referenced above are relatively easy to carry out. The easiest preventative measure is to turn off Bluetooth connectivity on your devices when you do not need it or if you suspect you’re in an area that is high-risk for cyberattacks. By doing this, you’ll be outside of the radar of cyber thieves looking for “discoverable” devices in near proximity. Also, make sure your devices are using the latest versions of Bluetooth, or at least versions that are still supported with updates that close off potential exploit loops. In addition, make sure you pair only with devices that you trust, and confirm that those devices are using supported Bluetooth versions.Maintaining Wireless Network Safety
If you want to stay safe on both Bluetooth and Wi-Fi networks, it’s important to understand how these networks operate, and that includes knowing how their infrastructures are exploited by cyber attackers who seek to infiltrate them. Start developing that understanding with courses from Cybrary’s cybersecurity catalog.Build your Cybersecurity or IT Career
Accelerate in your role, earn new certifications, and develop cutting-edge skills using the fastest growing catalog in the industry