Lior.Net


Posts Tagged ‘bluetooth’

The techniques to hack wireless device trough Bluetooth

Friday, June 6th, 2008

There are 3 common techniques how to hack wireless device. In this article I will review these techniques and advise how to protect your wireless device from such hack.

Bluesnarfing

is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs. This hack allow you to access the device calendar, email, text message ,contact , steal videos and images and even calling someone from your phone.

Most of the program that we exist today must allow connection and to be ‘paired’ to another phone to steal content however there are some program that don’t ask the wireless device if they can connect too and they can steal the information without letting the owner knows. The latter application are not common and not spread. btInfo

Bluejacking

sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as PDA’s, mobile phones and laptops or computers.

Bluejacking is usually harmless because no one can steal something from your phones or making a call but there is no doubt they it scare people.

Bluebugging

Allow hacker to "take control" of the victim’s phone. Not only can they make calls, they can send messages, essentially do anything the phone can do. This is a different technique than the Bluesnarfing and work only on old phones.

What are Phone Manufacturers Doing to Solve These Problems?

Most of the cell phone manufactures developed software patches that eliminate these techniques however  Bluesnarfing is still exists and from time to time there is a new Bluesnarfing software come out.

How can I Protect my Privacy ?

1. If you have an old phone, contact your manufacture and ask for a patch.

2. Turn your Bluetooth connection to be "Hidden"

3. Don’t Allow connection via Bluetooth from people that you are not familiar with.

Jajah is the VoIP player that brought you web-activated telephony.