Page 15 - WIRELESS TECHNOLOGIES- BLUETOOTH AND WI-FI
P. 15
attacks. Certain tools - such as RedFang and BlueSniff - allow hackers to infiltrate Bluetooth-
enabled devices that are not in discoverable mode
Fig.A.4.2 Bluetoothbugging
Bluebugged devices are vulnerable to one or more of the following scenarios:
A device can be remotely controlled, which allows hackers to intercept or reroute
communication.
Hackers may send and read text messages.
Hackers may place or monitor phone calls.
Hackers may do all of the above without leaving a trace.
Car Whispering: This involves the use of software that allows hackers to send and receive
audio to and from a Bluetooth enabled car stereo system
In order to protect against these and other forms of vulnerability, the manufacturers of Bluetooth
enabled devices are upgrading he security to ensure that these Bluetooth security lapses do not
arise with their products.
How to protect device from bluetooth attack?
1. Stay offline : Turn off features that you are not using. If you have a Bluetooth-equipped
device and do not need the function, then don't turn it on.
2. Stay invisible: If you are using the Bluetooth function and don't require your device ID
to be visible to others, make sure the device's visibility setting is set to "hidden" so
malicious hackers will not be able to scan and search for it.
3. Verify incoming transmission: Do not accept and run attachments from unknown
sources unless you are expecting them.
For example, if you receive a message to install an application and you don't know its
origin, don't run it.
4. Use passwords: Ideally, use passwords with a large number of digits.