SECURITY
What are some security concerns?
Depending upon how it is configured, Bluetooth
technology can be fairly secure. You can take advantage
of its use of key authentication (see
Understanding Digital Signatures for more
information) and encryption (see
Understanding Encryption for more information).
Unfortunately, many Bluetooth devices rely on short
numeric PIN numbers instead of more secure passwords or
passphrases (see
Choosing and Protecting Passwords for more
information).
If someone can "discover" your Bluetooth device, he
or she may be able to send you unsolicited messages or
abuse your Bluetooth service, which could cause you to
be charged extra fees. Worse, an attacker may be able to
find a way to access or corrupt your data. One example
of this type of activity is "bluesnarfing," which refers
to attackers using a Bluetooth connection to steal
information off of your Bluetooth device. Also, viruses
or other malicious code can take advantage of Bluetooth
technology to infect other devices. If you are infected,
your data may be corrupted, compromised, stolen, or
lost. You should also be aware of attempts to convince
you to send information to someone you do not trust over
a Bluetooth connection (see
Avoiding Social Engineering and Phishing Attacks for
more information).
How can you protect yourself?
- Disable Bluetooth when you are not using it
- Unless you are actively transferring information
from one device to another, disable the technology
to prevent unauthorized people from accessing it.
- Use Bluetooth in "hidden" mode - When you
do have Bluetooth enabled, make sure it is "hidden,"
not "discoverable." The hidden mode prevents other
Bluetooth devices from recognizing your device. This
does not prevent you from using your Bluetooth
devices together. You can "pair" devices so that
they can find each other even if they are in hidden
mode. Although the devices (for example, a mobile
phone and a headset) will need to be in discoverable
mode to initially locate each other, once they are
"paired" they will always recognize each other
without needing to rediscover the connection.
- Be careful where you use Bluetooth - Be
aware of your environment when pairing devices or
operating in discoverable mode. For example, if you
are in a public wireless "hotspot," there is a
greater risk that someone else may be able to
intercept the connection (see
Securing Wireless Networks for more information)
than if you are in your home or your car.
- Evaluate your security settings - Most
devices offer a variety of features that you can
tailor to meet your needs and requirements. However,
enabling certain features may leave you more
vulnerable to being attacked, so disable any
unnecessary features or Bluetooth connections.
Examine your settings, particularly the security
settings, and select options that meet your needs
without putting you at increased risk. Make sure
that all of your Bluetooth connections are
configured to require a secure connection.
- Take advantage of security options -
Learn what security options your Bluetooth device
offers, and take advantage of features like
authentication and encryption.
HOME
PREVIOUS
NEXT