Bluetooth Security Technology

With wireless networking comes the concern of security. How can you secure your devices connected by Bluetooth technology? How can you protect the information you send on your devices from being intercepted by hackers and unauthorized users?

Bluetooth does offer a variety of security modes, and each Bluetooth-enable device comes with one of these modes. In general to protect your Bluetooth connections, user can create a list of "trusted devices". Users can exchange data between the selected devices without asking for permission. However, when unrecognized devices try to send information to your device, the users can accept or deny information.


Bluetooth Comes with Security Options

Bluetooth offers service-level protection and device-level protection to secure your Bluetooth-enabled devices. The authorization and identification procedures that comes with Bluetooth's service-level protection, restricts anyone other than the registered Bluetooth user from using the service. It also lets the user to accept or reject a file or incoming data.

If you tend to use your Bluetooth mainly to connect your personal devices at home and not for socializing with other Bluetooth equipped friends, you can simply set your Bluetooth to the "non-discoverable" mode. This prevents other Bluetooth devices and users from connecting to your Bluetooth. This is one way you use Bluetooth's device-level protection.

Bluetooth's authorization and authentication processes often filters out malicious files from opening onto your device. Since you have to first accept the harmful file from the unknown user, and then agree to install it. This two step process, often prevents security breaches.

Bluetooth Security Concerns

However, Bluetooth like any other wireless networking has some security glitches. These glitches include: bluejacking, bluebugging and Car Whispers.

Bluejacking occurs when a Bluetooth user sends a generic text message or business card to other Bluetooth users within the proximity of 32 feet. If the user doesn't recognize that the sender may be harmful, he may accept the message. So the sender will be added to his contact list. After the unknown sender gets on the user's contact list, they can send another message automatically to the user, without having the user approve it.

Bluebugging is more serious and occurs when a hacker accesses a user's phone and can place calls and send text message to the user's contacts without the user knowing.

The piece of software called Car Whisperer lets hackers transmit and receive audio from a Bluetooth-enabled car stereo.


Log in or sign up to comment.

Post a comment

Log in or sign up to comment.
Spyware has many ways of getting onto your computer, such as:

When you download programs - particularly freeware, or peer-to-peer sharing programs.

More covertly, spyware can install itself just by you visiting certain sites, by prompting you to download an application to see the site properly.

ActiveX controls. These pesky spyware makers will prompt you to install themselves while using your Internet browser