{"id":11617,"date":"2017-06-05T08:30:49","date_gmt":"2017-06-05T13:30:49","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=11617"},"modified":"2017-06-07T09:51:06","modified_gmt":"2017-06-07T14:51:06","slug":"bluetooth-security-vunlerabilities","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/bluetooth-security-vunlerabilities\/","title":{"rendered":"Can Someone Hack My Android\u2019s Bluetooth?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">These days, almost all phones have a Bluetooth connection available. What you might not know is that this connection could be exposing your phone to hacking attempts. <\/span><span style=\"font-weight: 400;\">If you think your phone has been hacked, be sure to use the Security Scan feature to see if there have been any security breaches:<\/span><\/p>\n<p><center><a href=\"psafe:\/\/launch\/antivirus_quick\" rel=\"attachment wp-att-9829\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-9829\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/run-security-scan-1-300x67.jpg\" alt=\"run-security-scan\" width=\"300\" height=\"67\" srcset=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/run-security-scan-1-300x67.jpg 300w, https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/run-security-scan-1.jpg 353w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/center><span style=\"font-weight: 400;\">The Security Scan function allows you to quickly verify phone and app files to scan for viruses and fix any security breaches. Learn more about Bluetooth hacking and discover other ways to protect your Android phone.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Bluetooth hacking occurs when a hacker is able to connect to your phone using its Bluetooth connection. This hack can only occur if the hacker is within a potential hacked phone\u2019s Bluetooth range, which is roughly 30 feet. Once the hacker is connected, however, it opens up a hacked phone to all sorts of security vulnerabilities.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are <\/span><a href=\"http:\/\/www.lnttechservices.com\/media\/27618\/bluetooth-hacking-and-its-prevention-2014.pdf\"><span style=\"font-weight: 400;\">3 major types of Bluetooth hacking<\/span><\/a><span style=\"font-weight: 400;\">: bluejacking, bluesnarfing, and bluebugging. Bluejacking allows a hacked phone to send anonymous messages to other phones in the vicinity. Bluesnarfing is the practice of taking information like calendars, call lists, emails, and text messages, as well as pictures and private videos away from your phone and transferring them to the hacker. Bluebugging allows the hacker to take complete control of the phone, giving them the ability to listen in on taking and receiving calls from a hacked phone as well as complete access to a hacked phones call records. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">So what can you do to make sure your phone does not get hacked? Here are a couple solutions:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Turn off your phone\u2019s Bluetooth when you aren\u2019t using it. Keeping your Bluetooth on for unnecessary amounts of time just exposes you to the threat of being Bluetooth hacked. <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Don\u2019t accept any Bluetooth requests unless you know where they are coming from.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The older your phone is, the more susceptible it is to Bluetooth hacking, so if you are able, try to buy the most recent model of the phone of your choice. <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Keeping your phone firmware updated as well is a good way to prevent against Bluetooth hacking.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Be constantly aware of your phone\u2019s functions and how they can be used to exploit a vulnerability. Doing so can try to put you one step ahead of hackers. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Your Android\u2019s Bluetooth provides yet another window for hackers to sneak through. Keep reading to learn how to use Bluetooth securely. <\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[301,303,308,312,2183,2736,249,161],"class_list":["post-11617","post","type-post","status-publish","format-standard","hentry","category-security","tag-app2","tag-app3","tag-app6","tag-app8","tag-bluetooth","tag-hack","tag-security","tag-virus"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/11617","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=11617"}],"version-history":[{"count":0,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/11617\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=11617"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=11617"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=11617"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}