Have you ever been at a house where the baby monitor or the cordless phones pick up the neighbor’s conversations? This is sort of like that.
It’s also less about your actual Bluetooth itself and the fact that many people walk around with the Bluetooth enabled on their smartphone when they don’t use it which means it’s open for cybercreeps to Bluetooth their way in.
When you have Bluetooth turned on but not in use, you are basically broadcasting that your phone is on & available for other to Bluetooth to it!
HOW THEY DO IT:
A hacker can run a program on the computer that scans for Bluetooth connections. When they find one, bingo, they connect and they are in.
WHAT THEY TYPICALLY STEAL:
What do they take? Typically things like your address book, possibly your calendar, photos, using your phone to make long distance calls, or they may turn your phone into an impromptu speaker and listen to your conversations.
Three TIPS TO PROTECT YOURSELF:
- Turn your Bluetooth to “off” on devices such as your phone when not using the Bluetooth feature.
- You can also look at your manufacturer settings to see if there is a “hidden” or “private” mode.
- Refrain from sensitive and personal conversations using the Bluetooth device.
Find out more information at this page dedicated to Blue Tooth security: http://bluetooth.com/English/Technology/Works/Security/Pages/SecurityQA.aspx