Thursday, March 10, 2011

Bluetooth Jacking


Something unknown to most, that has in fact been an epidemic for quite sometime among hackers, technological pranksters, and people of the like, is Bluetooth Jacking. You may be wondering what is meant by this? What exactly is Bluetooth Jacking? What does it involve? Fear not! Your questions are about to be answered.

Bluetooth Jacking is a form of hacking that takes place over Bluetooth. It's primary targets are mobile phones, and smartphones. It has been around since the mid 2000's, and has been popular amongst hackers across the globe.

Bluetooth Jacking is a technique that involves exploiting vulnerabilities in Bluetooth devices to get into them, such as mobile phones, smartphones, etc. Bluetooth is a small range network type, primarily used for headsets, file transfer, and other phone-related devices/functions. It operates over low power radio waves, which can range up to 30 yards in signal. The frequency Bluetooth operates is known as the ISM band. 

Bluetooth technology has stayed the same over time for the most part, therefore, the security has not changed much either. Using a computer with a functioning Bluetooth signal output, hackers can use custom designed software, or tools from their arsenal to hack into your phone as soon as it is discovered. Typically sitting in an airport, coffee shop, or other local, heavily occupied area, they'll set to work. Once in, they can use your phone to do a various number of things. They can make calls, send SMS Messages, access the web, and even pull your contact list from your phone, getting the information of anyone on your phone that you have entered.

While this may seem frightening, there is one surefire way to avoid this happening to you. If you don't use it, simply go into your mobile device's settings, and turn off your Bluetooth discovery [which is typically on with most phones].

Here is a video showing you an example of a way hackers can use this exploit to scam you:






No comments:

Post a Comment