Using TWS or Bluetooth devices? Here’s how you can safeguard yourself from Bluetooth hacking – India Today

December 5, 2022 by No Comments

The demand for wireless devices is increasing as they provide speed, flexibility and network efficiency. However, these Bluetooth devices are now vulnerable to cyber-attack through Bluetooth hacking.

New Delhi,UPDATED: Dec 1, 2022 10:51 IST

By Divya Bhati: With the latest innovation and technology in smartphones and other gadgets, the dependency on wired connectivity is reducing. Most of the devices are now dependable on wireless connectivity of Bluetooth to make connections. People are further preferring wireless gadgets for more seamless connection without the hassle of carrying cord and wire. However, due to this the devices are getting more vulnerable to cyber-attack through Bluetooth connection- Bluebugging.

Bluetooth hacking or Bluebugging or Bluejacking is a hacking process where hackers get access to devices which have a discoverable Bluetooth connection. Hackers can pair their device through the victim’s phone or laptop and steal sensitive data and have full control over the device without their knowledge .

How Bluebugging works?

A hacker can hack and connect to a device when the Bluetooth is discoverable to users and the device is at a distance of 10 meters. To connect to device, they use brute force pairing, which basically means trying all the possible passwords to crack the connectivity code. Once the phone is connected, hackers install malware to steal sensitive data, get access to the calls, messages and even modify contacts. They can even transact money from the banking apps or can stalk and blackmail victims by stealing their private videos from the phone.

Which devices are more vulnerable to Bluebugging?

Any device that supports Bluetooth can be blue-bugged. The TWS (True Wireless Stereo) or wireless earbuds headphones, smartwatches which can record calls are all vulnerable to Bluetooth hacking. Apps which help phones connect with TWS or wireless devices also put smartphones at the risk of hacking if users don’t follow precautions.

How to protect yourself from Bluebugging?

  • Always turn off your Bluetooth when the device is not in use.
  • Turn off your ‘ (Device) visible to other devices’ in the Bluetooth setting.
  • Always update your device with the latest software and available security patches.
  • Restrict yourself from using open public Wi-Fi .
  • Never accept a Bluetooth pairing request in public or by unknown device.
  • Reboot or restart your device whenever you access public Wi-Fi.
  • Try not to name your Bluetooth device with your own name.
  • Always use an antivirus application on your device and scan your devices for virus and malware regularly.
  • Keep a check on all the connected devices on your Bluetooth and remove saved devices if they are not in use.
  • Try not to share or transfer sensitive data through Bluetooth.

— ENDS —

Published On:

Dec 1, 2022

Source: https://news.google.com/__i/rss/rd/articles/CBMinQFodHRwczovL3d3dy5pbmRpYXRvZGF5LmluL3RlY2hub2xvZ3kvbmV3cy9zdG9yeS91c2luZy10d3Mtb3ItYmx1ZXRvb3RoLWRldmljZXMtaGVyZXMtaG93LXlvdS1jYW4tc2FmZWd1YXJkLXlvdXJzZWxmLWZyb20tYmx1ZXRvb3RoLWhhY2tpbmctMjMwMzkwNS0yMDIyLTEyLTAx0gGhAWh0dHBzOi8vd3d3LmluZGlhdG9kYXkuaW4vYW1wL3RlY2hub2xvZ3kvbmV3cy9zdG9yeS91c2luZy10d3Mtb3ItYmx1ZXRvb3RoLWRldmljZXMtaGVyZXMtaG93LXlvdS1jYW4tc2FmZWd1YXJkLXlvdXJzZWxmLWZyb20tYmx1ZXRvb3RoLWhhY2tpbmctMjMwMzkwNS0yMDIyLTEyLTAx?oc=5

Tags:

Leave a Comment

Your email address will not be published. Required fields are marked *