Any Bluetooth device can be hacked. Know how?
In today's world, Bluetooth technology is integrated into almost every device we use, from wireless headsets, mice, and keyboards to cars and smart home devices. But with the convenience of this technology comes the risk of privacy and security breaches. Each Bluetooth device has potential vuln...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
KeAi Communications Co., Ltd.
2024-01-01
|
| Series: | Cyber Security and Applications |
| Subjects: | |
| Online Access: | http://www.sciencedirect.com/science/article/pii/S2772918424000079 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850194078713511936 |
|---|---|
| author | Prathibha Muraleedhara Mary Subaja Christo Jaya J Yuvasini D |
| author_facet | Prathibha Muraleedhara Mary Subaja Christo Jaya J Yuvasini D |
| author_sort | Prathibha Muraleedhara |
| collection | DOAJ |
| description | In today's world, Bluetooth technology is integrated into almost every device we use, from wireless headsets, mice, and keyboards to cars and smart home devices. But with the convenience of this technology comes the risk of privacy and security breaches. Each Bluetooth device has potential vulnerabilities that cybercriminals can exploit and take advantage of. It is important to create awareness about various Bluetooth vulnerabilities, exploits, and ways to prevent them. This article examines the dark side of Bluetooth technology by explaining how hackers can find ways to bypass the advanced security features of laptops, phones, cars, or smart home devices to compromise the devices and steal personal sensitive data. Whether it is a casual user of Bluetooth technology or a business owner with multiple devices, understanding these risks is crucial to protecting yourself and your information.This article begins by explaining the basics of Bluetooth technology and how it works. Followed by a list of security risks involved while using Bluetooth and finally, it highlights the best practices to protect the devices and the data they contain. |
| format | Article |
| id | doaj-art-0e070a4c60f248919f044483d5a3ae39 |
| institution | OA Journals |
| issn | 2772-9184 |
| language | English |
| publishDate | 2024-01-01 |
| publisher | KeAi Communications Co., Ltd. |
| record_format | Article |
| series | Cyber Security and Applications |
| spelling | doaj-art-0e070a4c60f248919f044483d5a3ae392025-08-20T02:14:06ZengKeAi Communications Co., Ltd.Cyber Security and Applications2772-91842024-01-01210004110.1016/j.csa.2024.100041Any Bluetooth device can be hacked. Know how?Prathibha Muraleedhara0Mary Subaja Christo1Jaya J2 Yuvasini D3College of Technology – Information Security and Program Management, University of Houston, TX 77204, USA; Corresponding author.Department of Networking and Communication, School of Computing, SRM Institute of Science and Technology, Kantankulathur, Chennai, IndiaDepartment of Electronics and Communication Engineering, Hindustan College of Engineering and Technology, IndiaAssistant Professor, Department of Computer Science and Business Systems, Thiagarajar College of Engineering, Madurai 625015, IndiaIn today's world, Bluetooth technology is integrated into almost every device we use, from wireless headsets, mice, and keyboards to cars and smart home devices. But with the convenience of this technology comes the risk of privacy and security breaches. Each Bluetooth device has potential vulnerabilities that cybercriminals can exploit and take advantage of. It is important to create awareness about various Bluetooth vulnerabilities, exploits, and ways to prevent them. This article examines the dark side of Bluetooth technology by explaining how hackers can find ways to bypass the advanced security features of laptops, phones, cars, or smart home devices to compromise the devices and steal personal sensitive data. Whether it is a casual user of Bluetooth technology or a business owner with multiple devices, understanding these risks is crucial to protecting yourself and your information.This article begins by explaining the basics of Bluetooth technology and how it works. Followed by a list of security risks involved while using Bluetooth and finally, it highlights the best practices to protect the devices and the data they contain.http://www.sciencedirect.com/science/article/pii/S2772918424000079BluetoothVulnerabilityExploitThreatAd hoc networks and security risk |
| spellingShingle | Prathibha Muraleedhara Mary Subaja Christo Jaya J Yuvasini D Any Bluetooth device can be hacked. Know how? Cyber Security and Applications Bluetooth Vulnerability Exploit Threat Ad hoc networks and security risk |
| title | Any Bluetooth device can be hacked. Know how? |
| title_full | Any Bluetooth device can be hacked. Know how? |
| title_fullStr | Any Bluetooth device can be hacked. Know how? |
| title_full_unstemmed | Any Bluetooth device can be hacked. Know how? |
| title_short | Any Bluetooth device can be hacked. Know how? |
| title_sort | any bluetooth device can be hacked know how |
| topic | Bluetooth Vulnerability Exploit Threat Ad hoc networks and security risk |
| url | http://www.sciencedirect.com/science/article/pii/S2772918424000079 |
| work_keys_str_mv | AT prathibhamuraleedhara anybluetoothdevicecanbehackedknowhow AT marysubajachristo anybluetoothdevicecanbehackedknowhow AT jayaj anybluetoothdevicecanbehackedknowhow AT yuvasinid anybluetoothdevicecanbehackedknowhow |