Security Q&A: Bluetooth Technology

NSI

See Also: Generative AI Survey Result Analysis: Google Cloud

Q: First, what is Bluetooth?

A: It’s a technology that lets devices communicate with each other sans cables or wires. More specifically, Bluetooth is a wireless standard, which means manufacturers of any device can ensure that their devices communicate with those from other companies.

Q: Why is Bluetooth so popular?

A: As anybody who’s ever surfed the Internet on their patio can attest, the value of today’s electronics skyrockets when they are freed of cables. The rapidly emerging world in which your laptop communicates wirelessly with your cell phone, car, home, and so forth opens up mind-boggling possibilities for productivity.

Q: If Bluetooth is poised to sweep the world, what’s the problem?

A: In a word, security. Bluetooth uses short-wave radio frequencies, and the technology is not discriminating – any Bluetooth-enabled device is happy to communicate with any other, as long as it’s in range.

As a result, Bluetooth devices are open to all manner of mischief and hacking. This may take the form of unsolicited messages (“blam,” or Bluetooth spam), or it may be more serious: attackers can access a company network through unsecured Bluetooth devices and steal or corrupt data. Some hacking groups have even figured out how to “broadcast” unsolicited verbal comments to Bluetooth-enabled cars passing by.

Q: Aren’t people working to make Bluetooth more secure?

A: Absolutely, and when properly configured, it can be reasonably safe. Key authentication and encryption features are built into Bluetooth. However, few users take advantage of these features – as usual, the human element is the weak link when it comes to information security.

© National Security Institute, Inc. This article is the property of the National Security Institute and my not be copied or redistributed in any fashion without an appropriate licensing agreement. For more information and FREE samples, visit http://nsi.org/SECURITYsense2.html


About the Author




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.