Nothing is completely safe today. Adobe has recently released a patch for a security hole in different graphical software, so why should Bluetooth be safe?
... and Bluetooth isn't safe off course! ;)
Two researchers of the Tel Aviv University School of Electrical Engineering Systems say they have discovered a technique for taking control of Bluetooth-enabled mobile phones. After you've established a connection with an other cell phone, the attacker can easily make calls with your phone. If there is a Bluetooth connection with a PC, the hacker can even transfer data between his Bluetooth device / cell phone and the hacked computer. Bluetooth can be very dangerous as you can see! Even when the handsets have security features switched on, your cell phone isn't save at all!
Avishai Wool, senior lecturer and Yaniv Shaked, graduate student and both researchers of the Tel Aviv University School of Electrical Engineering Systems have published recently a paper about three methods for forcing a repeat of the pairing process, "Cracking the Bluetooth PIN" ( http://www.eng.tau.ac.il/~yash/shaked-wool-mobisys05/ ). In this paper, a passive attack is described, in which an attacker can find the PIN used during the pairing process. The eye-opening conclusion of these two researchers: "Our results show that using algebraic optimizations, the most common Bluetooth PIN can be cracked within less than 0.06-0.3 seconds. If two Bluetooth devices perform pairing in a hostile area, they are vulnerable to this attack."
A Belgian Master student is making a fresh attempt to keep a list with Bluetooth security links on http://student.vub.ac.be/~sijansse/2e%20lic/BT/welcome.html.
Ollie Whitehousen security researcher of @stake, a digital security consulting firm ( http://www.atstake.com ) has written in October 2003 a paper that "examines methods of assessing the security of Bluetooth devices in relation to the protocol's design and implementation flaws" ( http://www.atstake.com/research/reports/acrobat/atstake_war_nibbling.pdf ).
In general, the most critical point is the 'pairing' - connection procedure of two Bluetooth devices. When a Bluetooth device asks you to re-enter the PIN number for re-pairing, once the two devices are re-connected, the hacker can now easily crack the PIN code.
Links:
- http://www.atstake.com/research/reports/acrobat/atstake_war_nibbling.pdf
- http://student.vub.ac.be/~sijansse/2e%20lic/BT/
- http://www.eng.tau.ac.il/~yash/shaked-wool-mobisys05/
For feedback on this article, please visit http://wallies.info/blog/item/145/index.html
Walter V. is a self-employed internet entrepreneur and founder-webmaster of several websites, including
wallies.info :: A snappy blog about snappy blue things :: blog | wiki | forum | links - http://wallies.info
mblo.gs :: A snappy moblog community - http://mblo.gs
Before you upgrade your PC hardware it's best to search... Read More
A cheap ink cartridge is sometimes the only way that... Read More
This article focuses on frequently asked questions by buyers of... Read More
IMO, these sd work 'like a VCR' as far as... Read More
Many people simply go to the retail store and get... Read More
Roll over lumbering desktop computers, the limber laptop is here,... Read More
The other day my son said to me, what else... Read More
Used laptop computers are everywhere these days. How can you... Read More
If you've been looking to upgrade your computer video card... Read More
Data loss is an expensive reality. It's a hard fact... Read More
If you have not seen the newest addition to the... Read More
Samsung laser toner is just as popular as its Hewlett-Packard... Read More
It appears we need to further streamline health care and... Read More
The first installment in this two-part series of Tech Tips... Read More
Used laptop computers are everywhere these days. How can you... Read More
HP refurbished laptops can be found on their website hpshopping.com.... Read More
A dedicated server is a single computer on a web-hosting... Read More
The gaming laptop is coming of age! It is steadily... Read More
Get ready everyone, home computers are about to set new... Read More
Most people understand preventive maintenance like changing the oil in... Read More
Laptop computers have found usefulness as portable media devices.Even refurbished... Read More
We all know that computers change more then any other... Read More
You are working at your computer and trying to print... Read More
We live in an area that has begun to... Read More
OverviewAs "generic", "remanufactured", and "new compatible" inkjet printer cartridges and... Read More
Wireless Networking, Part 1: Capabilities and HardwareThese days it isn't... Read More
After twelve years of owning desktop computers, I finally opted... Read More
Laptops or Notebook computers are an expensive personal and business... Read More
Junk faxes waste the resources of every business. It is... Read More
The other piece of vital equipment to accompany the rack... Read More
Interestingly, ergonomics though sounds to be a modern and trendy... Read More
RFID technology is used frequently today and has been around... Read More
As 2005 begins, there are a number of products on... Read More
So you know a little bit about tape backup, but... Read More
When you're studying for your CCNA exams, you're going to... Read More
As the proud owner of a laptop computer, you'll want... Read More
Printers are on-line devices initially categorised as being either impact... Read More
Tape drives remain the leading technology used by organizations for... Read More
CD ROMS - If you're adding or removing an internal... Read More
Nvidia has done it again, with it's newest video card,... Read More
Wireless Consulting and Solution Providers have always been important to... Read More
With all the technical terms out there, it is becoming... Read More
Hard Drives: ATA versus SATAThe performance of computer systems has... Read More
You are working and trying to print out important documents... Read More
When you work in an office, it's important to lock... Read More
All in one printers, also known as multifunction printers (MFPs),... Read More
Whether you are crunching figures at a front office job... Read More
It is extremely important not to make or write any... Read More
PCIThe expansion slots available on motherboards allow for a variety... Read More
For years, I smugly prided myself as a non-fax machine... Read More
There is two types of transformers in the market- linear... Read More
Here's how to format a hard drive (Legal Stuff: We... Read More
If you are like most student's, money isn't exactly growing... Read More
The following is a list of tips to help safeguard... Read More
There are many fancy add-ons for computers, but the basic... Read More
We all know that we should back up our system... Read More
Cleaning a laser printer, fax, or copier of laser toner... Read More
Laser toner is the ink for laser printers. It is... Read More
A dedicated server is a single computer on a web-hosting... Read More
Data loss is an expensive reality. It's a hard fact... Read More
In today's age, building computers on yourself is often chosen... Read More
Brother is right up there with HP and Samsung as... Read More
Think you got a great deal on a printer? Like... Read More
RAID is short for Redundant Array of Independent (or Inexpensive)... Read More
Get ready everyone, home computers are about to set new... Read More
You just poured hours upon hours into a lengthy research... Read More
Computer Hardware |