Pittsburgh Post-Gazette

Bluetooth is everywhere — and it could be a security risk

-

Bluetooth is everywhere — in your phone, laptop, tablet, mouse, keyboard, headphones and car.

Like Wi-Fi, Bluetooth works by sending data using radio waves. A Bluetooth device has to be connected or “paired” with the device it will send to or receive from. And like any wireless device, there are security concerns.

When Bluetooth is on, your device will look for others in “discoverab­le” mode. If it finds one, it will pair up. Bluetooth has a much shorter range than Wi-Fi. Depending on its class, it has a range of a few feet to more than 300 feet. Most common devices have a range of about 33 feet.

The connecting device often has to be put in discoverab­le mode by pushing a button or activating it in some other way. If your security settings are properly enabled, you may get a notice that the device has paired.

The host device may require a password to pair — or it may not. The default password is usually 0000. Some devices, like headphones or a mouse, have nowhere to enter a password.

With Bluetooth on, a device will reconnect when it comes in range of a device it was once paired with unless the host is told to “forget” the device or if a headset is paired with another device, for example. Most devices can be paired with more than one partner at the same time.

Using this Bluetooth architectu­re, your security can be penetrated.

Here are some of the ways, according to HowStuffWo­rks.com.

Bluejackin­g involves sending a text message to other Bluetooth users. If the user doesn’t realize what the message is, he might allow the contact to be added to his address book. Then the contact can send him messages that might be automatica­lly opened because they’re coming from a known contact.

Bluebuggin­g allows hackers to remotely access a user’s phone and use its features, including placing calls and sending text messages. The user doesn’t realize it’s happening.

Bluesnarfi­ng is the unauthoriz­ed access of informatio­n from a wireless device through a Bluetooth connection, often between phones, desktops and laptops. This allows access to calendars, contact lists, emails and text messages. On some phones, users can copy pictures and private videos.

Car Whisperer is a piece of software that allows hackers to send audio to and receive audio from a Bluetooth-enabled car stereo.

As long as security measures are enabled on the user’s phone or other device, unauthoriz­ed access is unlikely.

Most phones allow a list of favored devices that are the only ones allowed to connect. When you are not using Bluetooth, especially in public, it is a good idea to turn it off.

Because of its limited range, Bluetooth is not as big a security problem as Wi-Fi. But it also is not bulletproo­f.

A note on shipping: A reader pointed out something I neglected to mention in my last column, which was about Amazon charging for shipping on returns. Using a fairly new service called Prime Wardrobe, you can order multiple qualifying items. Then you have seven days to return the ones you don’t want with no shipping charges. This is especially handy for clothing. Check the site for all the rules.

Send comments, contributi­ons, correction­s and condemnati­ons to pgtechtext­s@gmail.com.

Newspapers in English

Newspapers from United States