Bluetooth: Handy, But Worrisome - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
News

Bluetooth: Handy, But Worrisome

The cheap, low-power radio connection known as Bluetooth is increasingly appearing in smart phones and other mobile devices, making it easier to connect phones, PDAs, headsets, printers, and notebooks to each other. Cell-phone makers tout being able to wirelessly sync contacts on a PC and smart phone. Yet at the same time, security concerns about the communication protocol are on the rise.

Worldwide shipments of Bluetooth chipsets hit 35.8 million units in 2002, market research firm In-Stat/MDR says, and it's projecting 74% annual growth in Bluetooth chipsets through 2007. More than half of all new cell phones purchased next year will come with Bluetooth capability, market analysts predict.

During the past year, security researchers have demonstrated how it's possible to steal data such as Short Message Service messages, phone books, and scheduling information through an attack called Bluesnarfing. Another attack, known as Bluebugging, involves using a Bluetooth connection to remotely commandeer a phone and have the phone call the attacker. Once the connection is made, the attacker can eavesdrop on the phone's owner.

When Mikko Hypponen, director of antivirus research at F-Secure Corp., tests Bluetooth-capable worms to see how easily they spread, you'd think he was handling radioactive material. "Testing these things is tricky. We can't test them in normal labs," he says. "These can fly through walls, and the sales guy one floor up may have Bluetooth and get infected. When we test these things for real we go to a radio-proof lab about a half-kilometer from our office."

Such vulnerabilities are turning some companies away from the technology. "Bluetooth is extremely insecure," says Jeff Nigriny, chief security officer with Exostar LLC, an online exchange. "By policy, we don't allow Bluetooth."

Return to main story, Dial V For Virus

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
State of the Cloud
State of the Cloud
Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
Slideshows
IT Careers: Top 10 US Cities for Tech Jobs
Cynthia Harvey, Freelance Journalist, InformationWeek,  1/14/2020
Commentary
Predictions for Cloud Computing in 2020
James Kobielus, Research Director, Futurum,  1/9/2020
News
What's Next: AI and Data Trends for 2020 and Beyond
Jessica Davis, Senior Editor, Enterprise Apps,  12/30/2019
Register for InformationWeek Newsletters
Video
Current Issue
The Cloud Gets Ready for the 20's
This IT Trend Report explores how cloud computing is being shaped for the next phase in its maturation. It will help enterprise IT decision makers and business leaders understand some of the key trends reflected emerging cloud concepts and technologies, and in enterprise cloud usage patterns. Get it today!
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll