Bluetooth users BEWARE! Hackers using Bluebugging to steal your data –Here’s how to remain safe

New Delhi: Bluetooth is a wireless technology that enables hands-free use of mobile devices for audio, navigation, and more. Many products such as computers, iPads, headphones, mobile phones, laptops, etc. have Bluetooth enabled, which may provide an incentive for hackers to compromise this feature.

Most people keep Bluetooth on all the time if it should be active only when needed. This is easier said than done and is unlikely to be followed. Here are his five typical flaws that, when exploited, would allow a hacker to hack her Bluetooth device and illustrate some of the risks associated with careless use of Bluetooth. (Also Read: WhatsApp Data Breach: A Step-by-Step Guide to Check If Your Data Has Been Leaked)

What is Bluebagging?

Hackers created this exploit after confirming that Bluejacking and BlueSnarfing Bluetooth attacks could be carried out. BlueBugging employs Bluetooth (AT&T Cybersecurity) to create a backdoor on victims’ phones and laptops. An attacker can not only hijack a Bluetooth device, but also examine all data on the device. (Also read: Big hit for Apple iPhone enthusiasts! Stay tuned for iPhone Pro models — here’s why)

Once inside the device, hackers can listen to calls and read texts. As a result, you can easily get her secret OTP after her phone is tapped. Hackers use her Bluetooth on smartphones and other devices to pry into sensitive data.

How can my device be hacked?

If your device’s Bluetooth is discoverable and you are within about 10 meters of the hacker, you are more likely to fall victim to a Bluebugging hack. After successfully pairing with a device, hackers’ next step is often to install malware and perform brute force attacks to disable the device’s security features. After installing the malware, it should be easier to access your data.

How to stay safe?

– Turn off Bluetooth if you don’t need it.

– Reject pairing requests from unidentified devices.

– Make sure you’re pairing your device for the first time at home and running the latest system version.

– Prefer quality VPN services.