Page 15 - WIRELESS TECHNOLOGIES- BLUETOOTH AND WI-FI
P. 15

attacks. Certain tools - such as RedFang and BlueSniff - allow hackers to infiltrate Bluetooth-
               enabled devices that are not in discoverable mode


















                                                Fig.A.4.2 Bluetoothbugging





               Bluebugged devices are vulnerable to one or more of the following scenarios:

                     A  device  can  be  remotely  controlled,  which  allows  hackers  to  intercept  or  reroute
                       communication.
                     Hackers may send and read text messages.
                     Hackers may place or monitor phone calls.
                     Hackers may do all of the above without leaving a trace.


               Car Whispering:   This involves the use of software that allows hackers to send and receive
               audio to and from a Bluetooth enabled car stereo system


               In order to protect against these and other forms of vulnerability, the manufacturers of Bluetooth
               enabled devices are upgrading he security to ensure that these Bluetooth security lapses do not
               arise with their products.


               How to protect device from bluetooth attack?

                   1.  Stay offline : Turn off features that you are not using. If you have a Bluetooth-equipped
                       device and do not need the function, then don't turn it on.
                   2.  Stay invisible: If you are using the Bluetooth function and don't require your device ID
                       to  be  visible  to  others,  make  sure  the  device's  visibility  setting  is  set  to  "hidden"  so
                       malicious hackers will not be able to scan and search for it.
                   3.  Verify  incoming  transmission:  Do  not  accept  and  run  attachments  from  unknown
                       sources unless you are expecting them.
                       For example, if you receive a message to install an application and you don't know its
                       origin, don't run it.
                   4.  Use passwords: Ideally, use passwords with a large number of digits.
   10   11   12   13   14   15   16   17   18   19   20