Wed, 06 July 2022
The Daily Ittefaq

Protect yourself from Bluetooth hackers

Update : 26 May 2022, 10:59

Bluetooth was initially used only to transfer files between two devices. With the emerging technologies, the feature is now being used in more and more devices. The way Bluetooth devices communicate with mobile apps leaves room for hackers to steal sensitive personal information. This is a problem that has been there for a long time.

A hacker could determine whether you have a particular Bluetooth device, such as a smart speaker, at your home, by identifying whether or not your smart device is broadcasting the particular UUIDs identified from the corresponding mobile apps.

If your device's Bluetooth on, photos, emails and personal information can be ripped off. Malware can be put on. Making it possible to spread to other vulnerable devices. It took him just a few clicks on a laptop and he was able to take control of the cell phone, take a picture and save it to his computer. All of this without ever laying a hand on it.
The best way to avoid the attack is to simply turn your Bluetooth off. You either live with the risk that your device is vulnerable or you turn it off and disconnect.
The biggest risk is to users with older mobile devices running older operating systems. The key tip for people is to run the scan on your cell phone to make sure it is safe. If it's not and there is not an update available, you can turn Bluetooth off on your phone. If there is an update available, do it.

Do not accept suspicious pairing requests and restrict pairing to new purchases and products owned by people you trust, such as at a party or dinner with friends, for example. Avoid pairing devices in public places.

If the pairing is temporary, don't forget to remove the device in question from your list of paired devices afterwards. Because, if a connected device is lost or stolen, it should be unlinked from your various other devices. Check the list of recognized devices in your Bluetooth settings from time to time, to make sure that there are no intruders.

More on this topic

Google to delete location history of visits to abortion clinics

Lost in space: Astronauts struggle to regain bone density

Elon Musk: Billionaire's daughter cuts ties with her father

SpaceX fires workers behind letter criticising Musk

More on this topic

Google ordered to pay up in defamation case

Musk accuses Twitter of withholding data, says may withdraw bid

Meta bans employees from talking about abortion at work

Snapchat steps up its own collaborative content