Page 32 - Cyber Warnings
P. 32







Unfortunately, the widespread adoption of Bluetooth functionality also comes with the
prevalence of Bluetooth security risks. Far too little has been done over the years to ensure the
security of a Bluetooth connection.

Some examples of Bluetooth security risks are Man in the Middle attacks (intercepting and then
changing commands), identity tracking, intercepting information, disruption of a device’s
operations, and passive eavesdropping.

While most people think your heart rate or music preferences aren’t that important, best
practices for Bluetooth security should always be engaged, as eavesdropping (or unauthorized
filming) could happen during an important, or secure, phone call made through an older
Bluetooth speaker.

In fact, though the Internet of Things is striving towards making our everyday life easier, there is
an ever-growing presence of an Internet of Evil Things.

The Internet of Evil Things is a very real threat. In fact, the UK Government has banned Apple
Watches from Cabinet meetings out of fear that they will record the room audio, track GPS
coordinates, or even monitor heart rates and be used as a crude lie detector.

As more and more capable devices are woven into people’s daily lives, there is more and more
risk associated with the vulnerabilities of those devices.

Some of Bluetooth’s vulnerabilities have already been demonstrated, and while not all may
seem dangerous, each provides another example of extra connectivity that resulted in
expanded vulnerabilities.

As many know, cars have been hacked into, proving that insecure Bluetooth functionality will
provide hackers with another beachhead in the future. Bluetooth Smart locks, which are meant
to keep homes and businesses secure, have also been revealed to be easily penetrable.

Securing Bluetooth connections should be like securing any kind of device or network – first and
formost, the protocol should be secure. However, you can still open yourself up to vast risks if
you aren’t careful implementing your Bluetooth technology.

The best security against Bluetooth vulnerabilities is simple: keep your devices up-to-date.
Bluetooth 4.2 is more protected than previous versions, however only further updates will be
able to protect against vulnerabilities as they crop up.

Another piece of advice is to take connected devices out of discoverable mode, and to be wary
of any unknown devices you pair with.





32 Cyber Warnings E-Magazine October 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   27   28   29   30   31   32   33   34   35   36   37