Nothing is completely safe today. Adobe has recently released a patch for a security hole in different graphical software, so why should Bluetooth be safe?
... and Bluetooth isn't safe off course! ;)
Two researchers of the Tel Aviv University School of Electrical Engineering Systems say they have discovered a technique for taking control of Bluetooth-enabled mobile phones. After you've established a connection with an other cell phone, the attacker can easily make calls with your phone. If there is a Bluetooth connection with a PC, the hacker can even transfer data between his Bluetooth device / cell phone and the hacked computer. Bluetooth can be very dangerous as you can see! Even when the handsets have security features switched on, your cell phone isn't save at all!
Avishai Wool, senior lecturer and Yaniv Shaked, graduate student and both researchers of the Tel Aviv University School of Electrical Engineering Systems have published recently a paper about three methods for forcing a repeat of the pairing process, "Cracking the Bluetooth PIN" ( http://www.eng.tau.ac.il/~yash/shaked-wool-mobisys05/ ). In this paper, a passive attack is described, in which an attacker can find the PIN used during the pairing process. The eye-opening conclusion of these two researchers: "Our results show that using algebraic optimizations, the most common Bluetooth PIN can be cracked within less than 0.06-0.3 seconds. If two Bluetooth devices perform pairing in a hostile area, they are vulnerable to this attack."
A Belgian Master student is making a fresh attempt to keep a list with Bluetooth security links on http://student.vub.ac.be/~sijansse/2e%20lic/BT/welcome.html.
Ollie Whitehousen security researcher of @stake, a digital security consulting firm ( http://www.atstake.com ) has written in October 2003 a paper that "examines methods of assessing the security of Bluetooth devices in relation to the protocol's design and implementation flaws" ( http://www.atstake.com/research/reports/acrobat/atstake_war_nibbling.pdf ).
In general, the most critical point is the 'pairing' - connection procedure of two Bluetooth devices. When a Bluetooth device asks you to re-enter the PIN number for re-pairing, once the two devices are re-connected, the hacker can now easily crack the PIN code.
Links:
- http://www.atstake.com/research/reports/acrobat/atstake_war_nibbling.pdf
- http://student.vub.ac.be/~sijansse/2e%20lic/BT/
- http://www.eng.tau.ac.il/~yash/shaked-wool-mobisys05/
For feedback on this article, please visit http://wallies.info/blog/item/145/index.html
Walter V. is a self-employed internet entrepreneur and founder-webmaster of several websites, including
wallies.info :: A snappy blog about snappy blue things :: blog | wiki | forum | links - http://wallies.info
mblo.gs :: A snappy moblog community - http://mblo.gs
Soon the human brain will be completely interfaced with the... Read More
Nowadays, more and more monitor comes in with flyback transformers... Read More
When comparing refurbished laptop models, ask about these specifications:Central Processing... Read More
Laptop computers have found usefulness as portable media devices.Even refurbished... Read More
MMC and SDFlash memory is available in so many formats... Read More
There is a great need for preventive maintenance in correctional... Read More
Toshiba offers a few of their refurbished laptops in the... Read More
Notebook computers are becoming very popular. They seem to be... Read More
1) Mechanical: This is a type of computer mouse that... Read More
Cheap laptop computers are coming to a store near you.... Read More
In today's age, building computers on yourself is often chosen... Read More
Roll over lumbering desktop computers, the limber laptop is here,... Read More
ROUTING PROTOCOLSA generic term that refers to a formula, or... Read More
So you need to check your IP address, for whatever... Read More
EEPROM stands for Electrical Erasable Programmable Read Only Memory and... Read More
Printer technology has made tremendous advances in the past five... Read More
If, for some reason, you can't get an exact replacement... Read More
From throwing our unnecessary files, to defragmenting, from partitions to... Read More
What to do once your PC is infected with spyware,... Read More
Many people simply go to the retail store and get... Read More
DVD is an optical disc storage media format that can... Read More
The process of adding USB 2.0 ports took no time... Read More
DVD CD ROMs have become predominantly the most used CD... Read More
Even with the popularity of digital technology, and the availability... Read More
Small Can Be BeautifulWhen purchasing a new computer, you may... Read More
Many small businesses have considered connecting computers and other devices... Read More
Used laptop computers are everywhere these days. How can you... Read More
Printers are on-line devices initially categorised as being either impact... Read More
Are you tired of laying wires through your house, creeping... Read More
The notebook computer is coming of age. For the first... Read More
Expansion Cards Part 2: AGPThe first in this series of... Read More
Wireless Networking, Part 1: Capabilities and HardwareThese days it isn't... Read More
Computing freedom, independence, and mobility don't have to come with... Read More
Computing freedom, independence, and mobility don't have to come with... Read More
Nvidia has done it again, with it's newest video card,... Read More
Switch mode power supply contain some large filter capacitors that... Read More
Used laptop computers are everywhere these days. How can you... Read More
In the first two installments of this series of Tech... Read More
The process of adding USB 2.0 ports took no time... Read More
Laser toner refills can be expensive. Over the life of... Read More
TiVo will change your life... for the better. Plain and... Read More
Forget about emptying your wallets every time you see the... Read More
A couple of the recent Tech Tips from www.geeks.com have... Read More
When it comes to sales of technology products over the... Read More
The first installment in this two-part series of Tech Tips... Read More
Our corporate intranet is a non-framed environment with both Lotus... Read More
Many people simply go to the retail store and get... Read More
Soon the human brain will be completely interfaced with the... Read More
Are you captivated by the stunning Case Mods you've seen... Read More
DVD is an optical disc storage media format that can... Read More
Who needs an LCD display? Well, if you're like me,... Read More
Blu ray is a next generation optical media format developed... Read More
Most HP and Epson printers are drop on demand printers.... Read More
It's easy to be intimidated by all the laptop models... Read More
Used laptop computers are everywhere these days. How can you... Read More
The importance of a bar code reader in this day... Read More
You've laid out good money for your laptop computer, but... Read More
It's not exactly breaking news that our world is becoming... Read More
It's most peoples worst computing nightmare. You wake up in... Read More
We all know that we should back up our system... Read More
Much has been written about solid state disks (SSDs) becoming... Read More
We all know what it is like when that message... Read More
When comparing refurbished laptop models, ask about these specifications:Central Processing... Read More
Why are there faint areas or gaps in my print... Read More
You will have many factors to consider when deciding on... Read More
Blu-ray is an optical disc format which is set to... Read More
Computer Hardware |