What are Bluetooth security threats in Security+?
D2 ยท Threats ยท CompTIA Security+ SY0-701Common Bluetooth attacks:
๐ฉ Bluejacking โ sends unsolicited messages to a Bluetooth device (annoying but harmless)
๐ Bluesnarfing โ unauthorized access to data (contacts, emails, calendar) via Bluetooth
๐ฎ Bluebugging โ full device control, including calls, messages, and eavesdropping
๐ต Bluetooth Eavesdropping โ passively captures Bluetooth traffic
๐ฟ BIAS attack โ impersonates a previously paired device
Mitigation: disable Bluetooth when not needed, use non-discoverable mode, enable Bluetooth authentication.
๐ฉ Bluejacking โ sends unsolicited messages to a Bluetooth device (annoying but harmless)
๐ Bluesnarfing โ unauthorized access to data (contacts, emails, calendar) via Bluetooth
๐ฎ Bluebugging โ full device control, including calls, messages, and eavesdropping
๐ต Bluetooth Eavesdropping โ passively captures Bluetooth traffic
๐ฟ BIAS attack โ impersonates a previously paired device
Mitigation: disable Bluetooth when not needed, use non-discoverable mode, enable Bluetooth authentication.
Know the three main Bluetooth attack names and what each does. Bluesnarfing and bluebugging are the most serious. Setting a device to non-discoverable mode reduces (but doesn't eliminate) risk. Bluetooth range is typically 10-100 meters.