How to secure Bluetooth devices

With the ability to connect to other devices such as a wireless network within a distance of 9m, Bluetooth is an integrated technology in a variety of devices from mobile phones, personal PDA assist devices and computers. portable to all kinds of cars ( Toyota Prius ) and many other special equipment .

Picture 1 of How to secure Bluetooth devices Bluetooth devices are also becoming the subject of security threats. Although the lack of security may be lower than WiFi wireless, the risk of security threats on Bluetooth has recently increased rapidly. Don't assume that the short range of Bluetooth may be safe. Currently, most people use mobile phones. Most mobile phones use Bluetooth as a wireless connection standard, so the security risk when using Bluetooth devices is very high.

To connect with each other, Bluetooth devices need to be paired (pair) together. While some devices are set up to connect to each other such as PDAs with printers, mobile phones and laptops are not allowed to connect. Bluetooth can manage such connection types. If you leave the device in "discorverable" mode , all users of other Bluetooth devices can connect to it.

Bluetooth specification is highly secure. When a pair of devices is connected, the information transmitted between them is encrypted. However, in practice, this connection could produce errors, such as: Cabir virus, which spreads via Bluetooth device connections and Symbian 6.0-based mobile phone devices by way of exploit vulnerabilities from faulty code in Symbian. However, not only Symbian Symbian devices are infected.

The popularity of Bluetooth has increased the risk of attack, some types of Bluetooth attacks are known as Bluejacking, Bluebugging, and Bluesnarfing. In Bluejacking, someone discovers a Bluetooth device and then sends anonymous information (advertising, business information .) to other Bluetooth devices. Bluebugging is much more dangerous, this type of attack allows other bluetooth users to connect to and execute remote commands to devices such as mobile or PDA. Attackers using Bluebugging can call, send messages, or even eavesdrop on the conversation. Bluesnarfing allows Bluetooth users to connect to other devices within the allowed distance. Thereby, an attacker can hijack access, get information about partners, work schedules . If users store more personal information on Bluetooth devices, they need to pay attention to security and privacy issues.

In fact, security for Bluetooth devices is not so difficult. Some of the following guidelines will help protect devices with Bluetooth connectivity:

- Your device pair will be safer if you use stronger PIN (Personal Information Numbers), with 8 characters or more.

- Periodically check the product provider's Web site to update the software, new fixes for the device. Even manufacturers offer bug fixes for their products, updating those patches is always later than announced vulnerabilities. The waiting period for launching patches can also cause bad consequences for users.

- Never receive Bluetooth messages or Bluetooth connection requests from people you don't know. Virus Cabir infects systems only when users receive messages and install attachments. You must also be very careful with the attachments in the mail.

The faster the development of Bluetooth technology, the more security threats such as worms, viruses, and hacking . become bigger and bigger. Therefore, security of devices with Bluetooth connectivity is very important. Make security for Bluetooth devices immediately, before the Bluetooth security wave rises.

Minh Phuc