{"id":4076,"date":"2020-01-23T19:39:32","date_gmt":"2020-01-23T07:39:32","guid":{"rendered":"https:\/\/kinetics.co.nz\/?p=4076"},"modified":"2020-01-23T19:39:32","modified_gmt":"2020-01-23T07:39:32","slug":"is-your-bluetooth-safe","status":"publish","type":"post","link":"https:\/\/new.kinetics.co.nz\/?p=4076","title":{"rendered":"Is your Bluetooth safe?"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;3.22&#8243;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.9.1&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Bluetooth has become ubiquitous.\u00a0 We use it to connect our phones, laptops, keyboards, mice, headphones, speakers, cars \u2013 more and more each day. Even watches now!<\/p>\n<p>It seems to have got easier, maybe because we\u2019re so practised with it.\u00a0 <strong>Bluetooth is everywhere.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>But is it safe?<\/strong><\/h2>\n<p>Hackers like to go after things that are in common use.\u00a0 That makes sense, as there are loads of targets and people get careless.<a href=\"http:\/\/kinetics.co.nz\/wp-content\/uploads\/2020\/01\/Bluetooth2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-4078\" src=\"http:\/\/kinetics.co.nz\/wp-content\/uploads\/2020\/01\/Bluetooth2-300x166.jpg\" alt=\"\" width=\"300\" height=\"166\" \/><\/a><\/p>\n<p>So, <strong>hackers do things like:<\/strong><\/p>\n<ul>\n<li>Bluejacking (Sending you messages via Bluetooth)<\/li>\n<li>BlueSnarfing (stealing data via Blueooth)<\/li>\n<li>BlueBugging (taking control of devices)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>If the hacker can exploit a bug in Bluetooth, or your carelessness, and get access your device, then <strong>they can have free rein.<\/strong>\u00a0\u00a0 They could turn on your microphone and listen to you.\u00a0 They can upload nonsense to your machine and disable it, or download your files.\u00a0 They could make a phone call, of hijack your data connection.<\/p>\n<p>While Bluetooth is generally encrypted, they shouldn\u2019t be able to eavesdrop your connections, but <strong>you do need to be patched up to date<\/strong>, on your phone and your laptop.\u00a0 (services like KARE for Mobile helps keeps phones up-to-date by identifying units that are running vulnerable versions).To combat this threat:<\/p>\n<ul>\n<li><strong>Ban devices that use Bluetooth 1.x, 2.0, or 4.0-LE<\/strong> and ensure devices use the latest versions and protocols.<\/li>\n<li><strong>Change the default pincodes on devices,<\/strong> especially those with microphones like many common Blueooth headsets and speakers \u2013 0000 or 1234 doesn\u2019t cut it!<\/li>\n<li>Keep devices <strong>patched up to date.<\/strong><\/li>\n<li><strong>Turn off Bluetooth<\/strong> when you aren\u2019t using it (it will also save your battery.)<\/li>\n<li><strong>Only \u2018scan\u2019 for new devices or make your device \u2018visible\u2019 when you actually want to make a connection<\/strong>.\u00a0 (I\u2019m always amazed at how many Bluetooth devices I can see and potentially connect to when I check this.)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Remember as well that although Bluetooth is only supposed to connect over relatively short distances, hackers can use aerials and boosters to reach further than you would expect.\u00a0 Their prize is to eavesdrop on you, upload a malicious file to you, and ultimately to steal from you.\u00a0\u00a0<\/p>\n<p><strong>Don\u2019t make it easy!<\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bluetooth has become ubiquitous.\u00a0 We use it to connect our phones, laptops, keyboards, mice, headphones, speakers, cars \u2013 more and more each day. Even watches now! It seems to have got easier, maybe because we\u2019re so practised with it.\u00a0 Bluetooth is everywhere. &nbsp; But is it safe? Hackers like to go after things that are [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"Bluetooth has become ubiquitous.\u00a0 We use it to connect our phones, laptops, keyboards, mice, headphones, speakers, cars \u2013 more and more each day. Even watches now!\n\nIt seems to have got easier, maybe because we\u2019re so practised with it.\u00a0 <strong>Bluetooth is everywhere.<\/strong>\n\n&nbsp;\n<h2><strong>[wow_colorme]But is it safe?[\/wow_colorme]<\/strong><\/h2>\nHackers like to go after things that are in common use.\u00a0 That makes sense, as there are loads of targets and people get careless.<a href=\"http:\/\/kinetics.co.nz\/wp-content\/uploads\/2020\/01\/Bluetooth2.jpg\"><img class=\"alignright size-medium wp-image-4078\" src=\"http:\/\/kinetics.co.nz\/wp-content\/uploads\/2020\/01\/Bluetooth2-300x166.jpg\" alt=\"\" width=\"300\" height=\"166\" \/><\/a>\n\nSo, <strong>hackers do things like:<\/strong>\n<ul>\n \t<li>Bluejacking (Sending you messages via Bluetooth)<\/li>\n \t<li>BlueSnarfing (stealing data via Blueooth)<\/li>\n \t<li>BlueBugging (taking control of devices)<\/li>\n<\/ul>\n<b>[wow_spacing size=\"10px\"]<\/b>\n\nIf the hacker can exploit a bug in Bluetooth, or your carelessness, and get access your device, then <strong>they can have free rein.<\/strong>\u00a0\u00a0 They could turn on your microphone and listen to you.\u00a0 They can upload nonsense to your machine and disable it, or download your files.\u00a0 They could make a phone call, of hijack your data connection.\n\nWhile Bluetooth is generally encrypted, they shouldn\u2019t be able to eavesdrop your connections, but <strong>you do need to be patched up to date<\/strong>, on your phone and your laptop.\u00a0 (services like KARE for Mobile helps keeps phones up-to-date by identifying units that are running vulnerable versions).\n\n[wow_spacing size=\"10px\"]\nTo combat this threat:\n<ul>\n \t<li><strong>Ban devices that use Bluetooth 1.x, 2.0, or 4.0-LE<\/strong> and ensure devices use the latest versions and protocols.<\/li>\n \t<li><strong>Change the default pincodes on devices,<\/strong> especially those with microphones like many common Blueooth headsets and speakers \u2013 0000 or 1234 doesn\u2019t cut it!<\/li>\n \t<li>Keep devices <strong>patched up to date.<\/strong><\/li>\n \t<li><strong>Turn off Bluetooth<\/strong> when you aren\u2019t using it (it will also save your battery.)<\/li>\n \t<li><strong>Only \u2018scan\u2019 for new devices or make your device \u2018visible\u2019 when you actually want to make a connection<\/strong>.\u00a0 (I\u2019m always amazed at how many Bluetooth devices I can see and potentially connect to when I check this.)<\/li>\n<\/ul>\n[wow_spacing size=\"20px\"]\n\nRemember as well that although Bluetooth is only supposed to connect over relatively short distances, hackers can use aerials and boosters to reach further than you would expect.\u00a0 Their prize is to eavesdrop on you, upload a malicious file to you, and ultimately to steal from you.\u00a0 [wow_spacing size=\"20px\"]\n\n<strong>Don\u2019t make it easy!<\/strong>","_et_gb_content_width":"","footnotes":""},"categories":[4],"tags":[],"class_list":["post-4076","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/4076","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4076"}],"version-history":[{"count":0,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/4076\/revisions"}],"wp:attachment":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4076"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4076"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4076"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}