Bluetooth and the IoT – What You Need to Know About Hacking

Just a few days ago, the United States Computer Emergency Readiness Team (US-CERT) issued a statement concerning the risks that Bluetooth devices could be compromised. The Bluetooth implementation vulnerabilities are known as  BlueBorne. In laymen’s terms, it means that millions of Bluetooth-enabled devices are vulnerable to multiple types of compromises.  

The vulnerable systems on those devices include Windows, iOS (Apple), Google, Android and Tizen systems. The warning is that a remote attacker can take control of these devices if they remain active without proper patches applied. This isn’t limited to just phones, desktops, and laptops. It includes any device that connects to the Internet of Things (IoT) that utilizes one of these operating systems. 

The best ways to protect your devices are to download patches as soon as they’re available. Due to the complexity of the patches, it may take time before they’re available to your device. It is recommended that you turn off Bluetooth capabilities on affected devices while able. Even with security updates, most software systems are protected to nearly perfect standards against hacking. However, the most sophisticated software can’t guarantee perfect security, which is why we recommend being diligent to update software regularly. 

September 22, 2017 by James Edwards Category: IT Security 0 comments

Recent Posts