There are millions of Bluetooth devices on the market today. In fact, it is almost harder to find a device that doesn't have Bluetooth. Over the last several years devices with Bluetooth show up in the following:
- Phones
- Cars
- Computers
- TVs
- Headsets
- Gaming consoles
- Tablets
Due to implementation of millions of Bluetooth devices in use, malicious security violations are now common events these days and expected to increase in the future.
The increased usage of Bluetooth devices makes security concerns even more alarming. Like any other wireless communication system Bluetooth transmission can be deliberately jammed or intercepted. False or modified information could be sent to the users by the attacker.
Some important common vulnerabilities are listed below:
- Blue jacking: Blue jacking is the process of sending unsolicited messages to Bluetooth-enabled devices.
- BlueSnarfing: is the illegal theft of information from Bluetooth enabled devices.
- BlueBugging: is an attack in which the attacker exploits a Bluetooth enabled in a device to get unauthorized access of the system and manipulate the target device to compromise its security.
Depending on your specific device, you'll have different Bluetooth options and settings available, but the same general advice applies to all. If your Bluetooth device is not paired with another Bluetooth device at any time, turn its Bluetooth capability off to avoid an unknown device from trying to connect to it. Even if you are paired with a device, you should still turn off Bluetooth discovery (so other devices can't see your phone) as well as auto pairing (which can allow a device you're not familiar with to connect to your phone without your approval).