What your phone vendor didn’t tell you about Bluetooth security


Article from Issue 80/2007

Is your address book open to the world? Is your mobile phone calling Russia? Many users don’t know how easy it is for an attacker to target Bluetooth.

Do you remember the friendly young man with the laptop sitting next to you on the subway this morning who got off one station before you did? Now he knows all about your appointment with the doctor tomorrow afternoon; he knows your girlfriend’s phone number; he’s read the messages your co-workers sent you after the meeting yesterday. In fact, he’s read all your messages and the phone numbers on your cell phone too. And, incidentally, he just
changed your appointment with the boss by one hour. You’re going to be late, and you can forget about that promotion.

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • Bluetooth Mobile Phones

    It is becoming increasingly common for new generation mobile phones to have an integrated Bluetooth interface. This article explores how to access your Bluetooth phone using Linux.

  • Bluetooth Hacks

    The user rules in Linux – if you know where you’re going. This month the trail leads deep into the Linux Bluetooth stack.

  • Bluetooth Headsets

    We’ll show you how to set up support for a Bluetooth stereo headset.

  • Bluetooth Wireless Network

    You can even use Bluetooth as an alternative form of wireless networking. We’ll show you how.

  • Bluetooth Printing

    Even if your printer vendor doesn’t advertise Linux Bluetooth support, there are a few tools that may help you set up your Linux system for Bluetooth printing.

comments powered by Disqus

Direct Download

Read full article as PDF:

Bluetooth_Security.pdf  (235.99 kB)