Using TWS or Bluetooth devices? Here’s how you can safeguard yourself from Bluetooth hacking – India Today

December 2, 2022 by No Comments

The demand for wireless devices is increasing as they provide speed, flexibility and network efficiency. However, these Bluetooth devices are now vulnerable to cyber-attack through Bluetooth hacking.

New Delhi,UPDATED: Dec 1, 2022 10:51 IST

Highlights

  • Hackers using Bluebugging to hack devices which have discoverable Bluetooth connections.
  • Bluebugging helps hackers take complete control of a device and access sensitive data.
  • Hackers can connect to devices, make calls, see messages and control device functions without the victim’s knowledge.

By Divya Bhati: With the latest innovation and technology in smartphones and other gadgets, the dependency on wired connectivity is reducing. Most of the devices are now dependable on wireless connectivity of Bluetooth to make connections. People are further preferring wireless gadgets for more seamless connection without the hassle of carrying cord and wire. However, due to this the devices are getting more vulnerable to cyber-attack through Bluetooth connection- Bluebugging.

Bluetooth hacking or Bluebugging or Bluejacking is a hacking process where hackers get access to devices which have a discoverable Bluetooth connection. Hackers can pair their device through the victim’s phone or laptop and steal sensitive data and have full control over the device without their knowledge .

How Bluebugging works?

A hacker can hack and connect to a device when the Bluetooth is discoverable to users and the device is at a distance of 10 meters. To connect to device, they use brute force pairing, which basically means trying all the possible passwords to crack the connectivity code. Once the phone is connected, hackers install malware to steal sensitive data, get access to the calls, messages and even modify contacts. They can even transact money from the banking apps or can stalk and blackmail victims by stealing their private videos from the phone.

Which devices are more vulnerable to Bluebugging?

Any device that supports Bluetooth can be blue-bugged. The TWS (True Wireless Stereo) or wireless earbuds headphones, smartwatches which can record calls are all vulnerable to Bluetooth hacking. Apps which help phones connect with TWS or wireless devices also put smartphones at the risk of hacking if users don’t follow precautions.

How to protect yourself from Bluebugging?

Tags:

Leave a Comment

Your email address will not be published. Required fields are marked *