Friday, May 3, 2024

All devices manufactured after 2014 can be hacked via Bluetooth

Date:

Hackers Can Hack Devices Via Bluetooth Due to Multiple Flaws (Indian Express)

Thursday 30 November 2023 / 20:51

Six flaws have been identified that affect laptops, smartphones and other devices running Bluetooth 4.2 or later, allowing hackers to compromise these devices.

Six new flaws called “BLUFFS” were discovered by Daniel Antonioli and use two previously undiscovered exploits in the Bluetooth architecture to allow users to encrypt file content when sending data over Bluetooth.

Bleeping Computer’s report indicates that the vulnerabilities affect all Bluetooth 4.2-equipped devices released in late 2014, and will also affect Bluetooth 5.4, which was revealed earlier this year. Apple’s AirDrop feature is also weak because it uses Bluetooth technology to transfer files between devices.

This means that all Bluetooth enabled devices like laptops, PCs, smartphones, tablets are affected by the problem. The report notes that all Bluetooth-enabled devices are vulnerable to at least three out of six BLFFS attacks.

What should I do to protect myself?

There is nothing users can do now to fix the vulnerabilities. Instead, device manufacturers must make changes to the security mechanisms the technology uses and discard the less-secure authentication methods used by legacy devices. However, it is not yet clear whether any patch will be released for existing devices.

Currently, the best way to protect yourself from newly discovered Bluetooth security flaws is to turn off Bluetooth when you’re done using it, but this may be inconvenient for most users. Other precautions users can take include avoiding sharing sensitive files and photos over Bluetooth in public, the paper said. Indian Express.

See also  Google lets you explore the neighborhood with a closer look
Stuart Wagner
Stuart Wagner
"Professional coffee fan. Total beer nerd. Hardcore reader. Alcohol fanatic. Evil twitter buff. Friendly tv scholar."

Share post:

Popular

More like this
Related

Unlocking the Power of Booking Engines in the Hospitality Industry

In an era dominated by technology, the hospitality industry...

Boost Your Sales with Perfect Banner Printing Services in Dubai

In the fast-paced world of business, effective advertising is...

Defend Against DDoS Attacks with Qrator Labs’ Anti-DDoS Solutions

Protecting your online assets from DDoS (Distributed Denial of...

UAE Powering Gaming Boom in the Middle East

The gaming industry in the Middle East is experiencing...