How to secure Bluetooth devices

How to secure Bluetooth devices Picture 1 With the ability to connect to other devices such as a wireless network within a distance of 9m, Bluetooth is an integrated technology in a variety of devices from mobile phones, personal PDA assist devices and computers. portable to all kinds of cars (Toyota Prius) and many other special equipment .


Bluetooth devices are also becoming the subject of security threats. Although the lack of security may be lower than WiFi wireless, the risk of security threats on Bluetooth has recently increased rapidly. Don't assume that the short range of Bluetooth may be safe. Currently, most people use mobile phones. Most mobile phones use Bluetooth as the wireless connection standard, so the security risk when using Bluetooth devices is very high.


To connect with each other, Bluetooth devices need to be paired (pair) together. While some devices are set up to connect to each other such as PDAs with printers, mobile phones and laptops are not allowed to connect. Bluetooth can manage such connection types. If you leave the device in "discorverable" mode, all users of other Bluetooth devices can connect to it.

Bluetooth specification is highly secure. When a pair of devices is connected, the information transmitted between them is encrypted. However, in practice, this connection could produce errors, such as: Cabir virus, which is infected by connecting Bluetooth devices and Symbian 6.0-based mobile phone devices by exploit vulnerabilities from faulty code in Symbian. However, not only Symbian Symbian devices are infected.
The popularity of Bluetooth has increased the risk of attack, some types of Bluetooth attacks are known as Bluejacking, Bluebugging, and Bluesnarfing. In Bluejacking, someone discovers a Bluetooth device and then sends anonymous information (advertising, business information .) to other Bluetooth devices. Bluebugging is much more dangerous, this type of attack allows other bluetooth users to connect to and execute remote commands to devices like mobile or PDA. Attackers using Bluebugging can call, send messages, or even eavesdrop on the conversation. Bluesnarfing allows Bluetooth users to connect to other devices within the allowed distance. Thereby, an attacker can hijack access, get information about partners, work schedules . If users store more personal information on Bluetooth devices, they need to pay attention to security and privacy issues.

In fact, security for Bluetooth devices is not so difficult. Some of the following guidelines will help protect your device with Bluetooth connectivity:

Your device pair will be safer if you use stronger PIN (Personal Information Numbers), with 8 characters or more.
Check the product provider's Web site periodically to update the software, new fixes for the device. Even manufacturers offer bug fixes for their products, updating those patches is always later than announced vulnerabilities. The waiting period for launching patches can also cause bad consequences for users.
Never receive Bluetooth messages or Bluetooth connection requests from people you don't know. Virus Cabir infects systems only when users receive messages and install attachments. You must also be very careful with the attachments in the mail.

The faster the development of Bluetooth technology, the more security threats such as worms, viruses, and hacking . become bigger and bigger. Therefore, security of devices with Bluetooth connectivity is very important. Make security for Bluetooth devices immediately, before the Bluetooth security wave rises.

Minh Phuc

5 ★ | 1 Vote

May be interested

  • Minimize risks from security attacksPhoto of Minimize risks from security attacks
    increasing strict control of employee software installation will help companies improve the network security situation.
  • Network security and the need to knowPhoto of Network security and the need to know
    while network and internet technologies offer many new growth and competitive opportunities for small and medium enterprises (smbs) it is also a time when it raises the need to protect computer systems against threats.
  • Update bug fixes for distributed environments via SYSTEM UPDATE SERVICES (SUS)Photo of Update bug fixes for distributed environments via SYSTEM UPDATE SERVICES (SUS)
    perhaps everyone has suffered from computer problems that resulted in virus, hacker data loss and system vulnerabilities. so, since 1998 microsoft has released a method to update patches when use windows operating system via www.windowsupdate.co website
  • Wi-Fi security: Choose which solution?Photo of Wi-Fi security: Choose which solution?
    security is a very important issue and is especially concerned by businesses. moreover, security is also the reason why businesses are afraid of installing wireless lan (wireless lan). they are concerned about security in wep (wire
  • Secure corporate networkPhoto of Secure corporate network
    in many respects, security risks are getting bigger as many businesses and companies use online trading methods with customers and partners to minimize related costs.
  • Is security really the problem?Photo of Is security really the problem?
    when talking about security, the scale and importance of it is the difference between big and small and medium enterprises. subsidiaries often have little internal it resources; most of them do not have director of economic security