Bluetooth has been an indispensable technology in modern life for three decades, helping to connect headphones, smart watches and many other devices. However, this convenience comes with security risks that many people are ignoring.
According to cybersecurity experts, leaving Bluetooth on 24/7, especially in public places, is the most common mistake that users can easily make. Although Bluetooth has added layers of encryption and security features, this wireless connection can still be exploited through forms such as bluesnarfing (data theft) or bluejacking (sending unauthorized messages and advertisements).
When Bluetooth is in a waiting state, hackers can take advantage of it to send messages, advertise or create unauthorized connections to the phone. Even more dangerous, if they gain access, bad guys can collect personal information, from registering credit cards, shopping under the victim's name, to accessing call logs, bank accounts or passwords. All happening silently, without leaving any warning.

Bluetooth can also be used to track users’ location and movement patterns. Some retail chains have used Bluetooth beacons to track shopping behavior. The risks extend beyond phones to wearable medical devices, such as pacemakers.
How to protect your device from Bluetooth attacks:
Turn off Bluetooth when not in use: Especially in cafes, airports or shopping malls.
Switch the device to Undiscoverable mode: Helps avoid being detected by unfamiliar devices.
Turn off auto-reconnect: Limit pairing with untrusted sources.
Update your operating system regularly: Prevent the BlueBorne vulnerability that allows hackers to take control, turn on the camera, or access apps without the user's knowledge.
Reject strange pairing requests: Do not accept any connections from unknown sources.
Check app permissions: Periodically review unnecessary Bluetooth or Wi-Fi permissions.
Use VPN: Encrypt data and hide IP address, reducing the risk of attack.
Experts stress that Bluetooth is convenient but poses serious risks to users' data and assets, and taking basic precautions is imperative to protect devices and personal information.
Source: https://baolaocai.vn/nguy-co-rinh-rap-tu-bluetooth-nguoi-dung-dien-thoai-co-the-mat-sach-tien-neu-khong-tat-tinh-nang-nay-post886557.html






Comment (0)