Beware Of Types Of Bluetooth Hacks

You may have heard references to one or more of these terms in emails from friends or conversations with the IT pros in your company. Here’s a quick rundown for your reference:

Bluejacking: Also known as Bluetooth spam, anonymous “business cards” sent via Bluetooth to discoverable devices in range.Bluebugging: Allows hackers to access mobile phone commands (AT commands) via Bluetooth, allowing access to SMS (Short Message Service), phonebook, call sending, and eavesdropping. Older, first-generation Bluetooth phones are the most susceptible to this kind of attack.

Bluesnarfing: Allows access to data on a Bluetooth-enabled phone. Data at risk in a Bluesnarf attack includes the calendar, phonebook, and IMEI (International Mobile Equipment Identity). Bluesnarfing affects mostly Nokia and Sony Ericcson phones.

Denial of Service (DoS): Constant requests for response from Bluetooth. It causes excess battery drain and temporary blockage of Bluetooth access by peripherals. There’s no real risk; it’s just extremely annoying.Interception: Use of a specially made Bluetooth device to interrupt paired devices. A device will request repairing while disguised as previously paired device and intercept the PIN entered, allowing access to cell phone or PDA.

Cabir Worm: Self-replicating malicious software that spreads via Bluetooth. The worm only affects Bluetooth-enabled phones using the Symbian Series 60 User Interface Platform. A user must manually accept the worm for infection to take place.

Sign by Danasoft - Get Your Free Sign

Visitors