Nothing is completely safe today. Adobe has recently released a patch for a security hole in different graphical software, so why should Bluetooth be safe?
... and Bluetooth isn't safe off course! ;)
Two researchers of the Tel Aviv University School of Electrical Engineering Systems say they have discovered a technique for taking control of Bluetooth-enabled mobile phones. After you've established a connection with an other cell phone, the attacker can easily make calls with your phone. If there is a Bluetooth connection with a PC, the hacker can even transfer data between his Bluetooth device / cell phone and the hacked computer. Bluetooth can be very dangerous as you can see! Even when the handsets have security features switched on, your cell phone isn't save at all!
Avishai Wool, senior lecturer and Yaniv Shaked, graduate student and both researchers of the Tel Aviv University School of Electrical Engineering Systems have published recently a paper about three methods for forcing a repeat of the pairing process, "Cracking the Bluetooth PIN" ( http://www.eng.tau.ac.il/~yash/shaked-wool-mobisys05/ ). In this paper, a passive attack is described, in which an attacker can find the PIN used during the pairing process. The eye-opening conclusion of these two researchers: "Our results show that using algebraic optimizations, the most common Bluetooth PIN can be cracked within less than 0.06-0.3 seconds. If two Bluetooth devices perform pairing in a hostile area, they are vulnerable to this attack."
A Belgian Master student is making a fresh attempt to keep a list with Bluetooth security links on http://student.vub.ac.be/~sijansse/2e%20lic/BT/welcome.html.
Ollie Whitehousen security researcher of @stake, a digital security consulting firm ( http://www.atstake.com ) has written in October 2003 a paper that "examines methods of assessing the security of Bluetooth devices in relation to the protocol's design and implementation flaws" ( http://www.atstake.com/research/reports/acrobat/atstake_war_nibbling.pdf ).
In general, the most critical point is the 'pairing' - connection procedure of two Bluetooth devices. When a Bluetooth device asks you to re-enter the PIN number for re-pairing, once the two devices are re-connected, the hacker can now easily crack the PIN code.
Links:
- http://www.atstake.com/research/reports/acrobat/atstake_war_nibbling.pdf
- http://student.vub.ac.be/~sijansse/2e%20lic/BT/
- http://www.eng.tau.ac.il/~yash/shaked-wool-mobisys05/
For feedback on this article, please visit http://wallies.info/blog/item/145/index.html
Walter V. is a self-employed internet entrepreneur and founder-webmaster of several websites, including
wallies.info :: A snappy blog about snappy blue things :: blog | wiki | forum | links - http://wallies.info
mblo.gs :: A snappy moblog community - http://mblo.gs
![]() |
|
![]() |
|
![]() |
|
![]() |
Plug and play equipment or hardware solves the problem of... Read More
It appears we need to further streamline health care and... Read More
If you've been in the market for a new computer... Read More
Now you can more easily access the Internet wherever mobile... Read More
Thinking about getting a new computer, but with all the... Read More
CCNA and CCNP candidates hear it all the time: "you... Read More
You can purchase an inkjet printer for as little as... Read More
There is two types of transformers in the market- linear... Read More
Most people understand preventive maintenance like changing the oil in... Read More
Used laptop computers are everywhere these days. How can you... Read More
You are working and trying to print out important documents... Read More
1) Mechanical: This is a type of computer mouse that... Read More
Throughout the years there have been many technologies involved with... Read More
It's no big secret that printer companies like HP and... Read More
So you know a little bit about tape backup, but... Read More
Much has been written about solid state disks (SSDs) becoming... Read More
The USB standard has become the universal means of connection... Read More
Are you captivated by the stunning Case Mods you've seen... Read More
Here's how to format a hard drive (Legal Stuff: We... Read More
In the past computers and their accompanying printers were huge.... Read More
Get ready everyone, home computers are about to set new... Read More
OK I confess I've bought at least 10 inkjet printers... Read More
Digital cameras have really taken off in popularity in recent... Read More
For years, I smugly prided myself as a non-fax machine... Read More
Wireless Consulting and Solution Providers have always been important to... Read More
OverviewAs "generic", "remanufactured", and "new compatible" inkjet printer cartridges and... Read More
A surge protector [AKA surge suppressor] is an electrical plug-in... Read More
Toshiba offers a few of their refurbished laptops in the... Read More
We all know what it is like when that message... Read More
Other then keeping your HDD free of viruses, spyware, and... Read More
With all the technical terms out there, it is becoming... Read More
Soon the human brain will be completely interfaced with the... Read More
With technology advancing more every day, electronics have become smaller... Read More
Interestingly, ergonomics though sounds to be a modern and trendy... Read More
Wow- if you do it first time and have some... Read More
Cleaning a laser printer, fax, or copier of laser toner... Read More
This is the first article in the Understanding Your Computer... Read More
Have you ever encountered before the problem of having multiple... Read More
Tape drives remain the leading technology used by organizations for... Read More
Wireless Consulting and Solution Providers have always been important to... Read More
Offering secure public Internet access is not as easy as... Read More
Small Can Be BeautifulWhen purchasing a new computer, you may... Read More
Someone recently asked me "I teach senior citizens in a... Read More
Are you captivated by the stunning Case Mods you've seen... Read More
With all the wheeling and dealing that seems to take... Read More
Printer technology has made tremendous advances in the past five... Read More
All capacitors have a certain amount of resistance to the... Read More
You've laid out good money for your laptop computer, but... Read More
In today's age, building computers on yourself is often chosen... Read More
If you've been looking to upgrade your computer video card... Read More
Laptop computers have found usefulness as portable media devices.Even refurbished... Read More
IntroductionThis document explains topics relating to wireless networks. The main... Read More
So you know a little bit about tape backup, but... Read More
Printer cartridge overheads can be a major expense for any... Read More
Digital voice recorders have become increasingly popular over the last... Read More
Have you ever felt like throwing the fax machine out... Read More
Are you getting tired of the high cost of printing?... Read More
Junk faxes waste the resources of every business. It is... Read More
Much has been written about solid state disks (SSDs) becoming... Read More
Used laptop computers are everywhere these days. How can you... Read More
Samsung laser toner is just as popular as its Hewlett-Packard... Read More
Perhaps the biggest mistake people make when building their computer(s)... Read More
So many people have small USB drives today, but what... Read More
The notebook computer is coming of age. For the first... Read More
The process of adding USB 2.0 ports took no time... Read More
Used laptop computers are everywhere these days. How can you... Read More
Computer Hardware |