Bluetooth prone to hack?
Is it true that if your bluetooth is always ON there is a possibility that you can be hack?
iPhone 4S, iOS 5.0.1
Is it true that if your bluetooth is always ON there is a possibility that you can be hack?
iPhone 4S, iOS 5.0.1
There have been bluetooth hacks on iphones but they have been jail broke. Recently there was a bunch of vulnerabilities found in how bluetooth is used I think it is called Blueborne. Anyway Iphone is safe from blueborne but not from zero days. When you have bluetooth on your device is out there and another bluetooth device can try to speak with it. Also you device can be scanned and if there is a vulnerability in any of the bluetooth stack such as sdp services someone can exploit that and hack your iphone. Taking your pictures and data or other doing other nasty stuff.
There has not been that much security research into bluetooth so there is yet more to be found out. A recommendation by security researchers who mainly focus on wireless and bluetooth security research. Is if you are not going to use bluetooth, please turn it off then in order to minimize your risk of a potential security breach. Personally I use this advice and if I have to use my sound bar sure i'll connect, but once i'm done i turn bluetooth off.
There have been bluetooth hacks on iphones but they have been jail broke. Recently there was a bunch of vulnerabilities found in how bluetooth is used I think it is called Blueborne. Anyway Iphone is safe from blueborne but not from zero days. When you have bluetooth on your device is out there and another bluetooth device can try to speak with it. Also you device can be scanned and if there is a vulnerability in any of the bluetooth stack such as sdp services someone can exploit that and hack your iphone. Taking your pictures and data or other doing other nasty stuff.
There has not been that much security research into bluetooth so there is yet more to be found out. A recommendation by security researchers who mainly focus on wireless and bluetooth security research. Is if you are not going to use bluetooth, please turn it off then in order to minimize your risk of a potential security breach. Personally I use this advice and if I have to use my sound bar sure i'll connect, but once i'm done i turn bluetooth off.
No.
I found this article about bluetooth hacking and it made me worry
When Bluetooth is enabled on your device, it’s essentially broadcasting the fact that “I’m here, and I’m able to connect” to any other Bluetooth-based devices within range. This makes using Bluetooth simple and straightforward for the consumer, but also lets hackers know which ones to target very easily. Here’s how it’s done; a hacker can simply download some special software and install it on a laptop or netbook. He can then install a Bluetooth antenna to that computer and put everything in a backpack, briefcase, etc. Now, all he has to do is walk around public places where a lot of people are concentrated, and let the computer running in his bag do all the work while no one has any idea what’s happening.
The software on the computer will constantly scan the nearby surroundings of the hacker for active Bluetooth connections, and when it finds them, can do a variety of things without the owner having any idea what’s going on. The entire process is automated for the hacker as well, so all he has to do is walk around for as long as he can and collect as much data as possible, which he can then manipulate. Some attacks are less damaging from others, but Bluetooth allows the hacker to do many things.
Once the hacker’s software finds and connects to a vulnerable Bluetooth-enabled cell phone, it can do things like download address book information, photos, calendars, SIM card details, make long-distance phone calls using the hacked device, bug phone calls and much more. There’s a myriad of software freely available that’s made specifically to attack cell phones via Bluetooth connections, and every time an update to the technology or certain cell phones becomes available there’s bound to be new hacking software for it. Certain attacks have become so prevalent that they even have names these days
AFAIK, BT hacking is possible with basic mobile phones but not an iPhone. There have been no reported real-life iPhone hacks via BT.
Bluetooth prone to hack?