Breaking

Sunday, September 24, 2017

Hacking and insecurity: you should forget about using bluetooth

Many of the things that are used today are based on a rather unsafe technology.


We are going to ask a favor: without looking very much your mobile answer us to a question: does it have bluetooth? Most likely, your answer is, "I do not know." Unless, of course, you're the one who connects to the car as hands-free or has an iPhone and uses Air Pods. Most of the others do not use it. And maybe even better.

And is that bluetooth enjoyed a great popularity a few years ago, before the arrival of smart phones to the technology market. But today, with smartphones already more than implemented, has fallen into disuse ... except the exceptions discussed above.

Because unless they have a wireless headset or something similar, the fact is that most users have no idea if your phone has bluetooth or what exactly it is.

Totally insecure

If you belong to that group of users, congratulations. Because yes, your phone has bluetooth (unless you are 20, in which case you have to look at it), but chances are that you have never used it. And believe us: it's one of the best ideas you could have in your whole life: the reason is that in case it can be dangerous.

This has been demonstrated by the cybersecurity company Armis. In a study just published, the technology company opens its eyes with a revelation: bluetooth is one of the best tools possible if you want to put your mobile in danger. And, contrary to what one might think, the cybersecurity parameters of this technology are more than deficient. In fact, today is one of the favorite hackers who want to get all your data, your information.

How to hack a mobile with Bluetooth

Armis' researchers have not stayed in theory, but have gone further and decided to take action. In their study they have demonstrated how easy it is to hack a mobile phone entering through their bluetooth connection to leave no trace, to plot with everything they find and, ultimately, to make the mess.



In fact, you do not even have to have the bluetooth in permanent operation or in the mode of discovering devices: it is enough that you have it enabled and active so that someone enters your device and you do not know what they are doing in there .

Worst of all is that, although we are focusing on mobiles, this vulnerability is applicable to any other device with bluetooth: your laptop or tablet also mail serious danger of hacking if you have this feature active.

So you know: first of all, check if your phone has bluetooth (most likely yes). Once this is done, are you enabled and active? If you do not use it, disable it. Because with hacks always happens the same: it is unlikely that you are among the 'lucky', but statistics gives you options, so do not tempt luck. In addition, your battery will also thank you, by the way.

No comments:

Post a Comment