Any Bluetooth device can be hacked. Know how?

In today's world, Bluetooth technology is integrated into almost every device we use, from wireless headsets, mice, and keyboards to cars and smart home devices. But with the convenience of this technology comes the risk of privacy and security breaches. Each Bluetooth device has potential vuln...

Full description

Saved in:
Bibliographic Details
Main Authors: Prathibha Muraleedhara, Mary Subaja Christo, Jaya J, Yuvasini  D
Format: Article
Language:English
Published: KeAi Communications Co., Ltd. 2024-01-01
Series:Cyber Security and Applications
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S2772918424000079
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850194078713511936
author Prathibha Muraleedhara
Mary Subaja Christo
Jaya J
Yuvasini  D
author_facet Prathibha Muraleedhara
Mary Subaja Christo
Jaya J
Yuvasini  D
author_sort Prathibha Muraleedhara
collection DOAJ
description In today's world, Bluetooth technology is integrated into almost every device we use, from wireless headsets, mice, and keyboards to cars and smart home devices. But with the convenience of this technology comes the risk of privacy and security breaches. Each Bluetooth device has potential vulnerabilities that cybercriminals can exploit and take advantage of. It is important to create awareness about various Bluetooth vulnerabilities, exploits, and ways to prevent them. This article examines the dark side of Bluetooth technology by explaining how hackers can find ways to bypass the advanced security features of laptops, phones, cars, or smart home devices to compromise the devices and steal personal sensitive data. Whether it is a casual user of Bluetooth technology or a business owner with multiple devices, understanding these risks is crucial to protecting yourself and your information.This article begins by explaining the basics of Bluetooth technology and how it works. Followed by a list of security risks involved while using Bluetooth and finally, it highlights the best practices to protect the devices and the data they contain.
format Article
id doaj-art-0e070a4c60f248919f044483d5a3ae39
institution OA Journals
issn 2772-9184
language English
publishDate 2024-01-01
publisher KeAi Communications Co., Ltd.
record_format Article
series Cyber Security and Applications
spelling doaj-art-0e070a4c60f248919f044483d5a3ae392025-08-20T02:14:06ZengKeAi Communications Co., Ltd.Cyber Security and Applications2772-91842024-01-01210004110.1016/j.csa.2024.100041Any Bluetooth device can be hacked. Know how?Prathibha Muraleedhara0Mary Subaja Christo1Jaya J2 Yuvasini  D3College of Technology – Information Security and Program Management, University of Houston, TX 77204, USA; Corresponding author.Department of Networking and Communication, School of Computing, SRM Institute of Science and Technology, Kantankulathur, Chennai, IndiaDepartment of Electronics and Communication Engineering, Hindustan College of Engineering and Technology, IndiaAssistant Professor, Department of Computer Science and Business Systems, Thiagarajar College of Engineering, Madurai 625015, IndiaIn today's world, Bluetooth technology is integrated into almost every device we use, from wireless headsets, mice, and keyboards to cars and smart home devices. But with the convenience of this technology comes the risk of privacy and security breaches. Each Bluetooth device has potential vulnerabilities that cybercriminals can exploit and take advantage of. It is important to create awareness about various Bluetooth vulnerabilities, exploits, and ways to prevent them. This article examines the dark side of Bluetooth technology by explaining how hackers can find ways to bypass the advanced security features of laptops, phones, cars, or smart home devices to compromise the devices and steal personal sensitive data. Whether it is a casual user of Bluetooth technology or a business owner with multiple devices, understanding these risks is crucial to protecting yourself and your information.This article begins by explaining the basics of Bluetooth technology and how it works. Followed by a list of security risks involved while using Bluetooth and finally, it highlights the best practices to protect the devices and the data they contain.http://www.sciencedirect.com/science/article/pii/S2772918424000079BluetoothVulnerabilityExploitThreatAd hoc networks and security risk
spellingShingle Prathibha Muraleedhara
Mary Subaja Christo
Jaya J
Yuvasini  D
Any Bluetooth device can be hacked. Know how?
Cyber Security and Applications
Bluetooth
Vulnerability
Exploit
Threat
Ad hoc networks and security risk
title Any Bluetooth device can be hacked. Know how?
title_full Any Bluetooth device can be hacked. Know how?
title_fullStr Any Bluetooth device can be hacked. Know how?
title_full_unstemmed Any Bluetooth device can be hacked. Know how?
title_short Any Bluetooth device can be hacked. Know how?
title_sort any bluetooth device can be hacked know how
topic Bluetooth
Vulnerability
Exploit
Threat
Ad hoc networks and security risk
url http://www.sciencedirect.com/science/article/pii/S2772918424000079
work_keys_str_mv AT prathibhamuraleedhara anybluetoothdevicecanbehackedknowhow
AT marysubajachristo anybluetoothdevicecanbehackedknowhow
AT jayaj anybluetoothdevicecanbehackedknowhow
AT yuvasinid anybluetoothdevicecanbehackedknowhow