What are the main security risks of Bluetooth?


Bluetooth is nearly ubiquitous these days, but it is one potential attack vector that I haven't put much though into. What are the main things to worry about when it comes to Bluetooth security? I would think they would be limited due to the inherent short range of the signal.

Topic: Security
Answer this Question


2 total
Vote Up (14)

There are quite a few potential weaknesses. NIST's National Vulnurability Database has 83 listed when I just checked. Go the the website, search for bluetooth to see for yourself. Most of these are low risk though, as you would expect from the physically limited range of bluetooth. 

Vote Up (8)

See this article for details:

What are some security risks of having a Bluetooth?

"While Bluetooth connections have the advantage that they're automatic and wireless, they have the disadvantage of their data being vulnerable to interception along with any other data sent on low-power radio waves. In addition to the risk of other people being able to receive your sensitive information, they're also able to send you files or viruses that you're absolutely not interested in."

Ask a question

Join Now or Sign In to ask a question.
Apple users accessing Gmail on mobile devices could be at risk of having their data intercepted, a mobile security company said Thursday.
The source code for an impressively small but capable malware program that targets online bank accounts has been leaked, according to CSIS Security Group of Denmark.
Financial and business information was stolen from several shipping and logistics firms by sophisticated malware hiding in inventory scanners manufactured by a Chinese company.
In wake of psychological experiment, group challenges users to take a Facebook break and find out if it makes them happier.
The Department of Homeland Security mistakenly released details on an experiment in which a 27-ton generator was destroyed via a cyberattack.
Police from eight countries together with several private security companies disrupted the online infrastructure used by cybercriminals to control computers infected with a malware program called Shylock.
The scope of a recent security breach at a digital certificate authority (CA) controlled by the Indian government is bigger than initially thought and also targeted domain names owned by Yahoo, in addition to several owned by Google.
Hackers increasingly target small firms as a way to get to the big guys. Here's what companies need to do to step up their game.
Microsoft has reached a settlement with domain provider No-IP to disable some of its domains, after taking control of part of its network to shut down a botnet.
More than 40 privacy, civil rights and religious groups have called on President Barack Obama's administration to provide a "full public accounting" of long-time email surveillance of prominent Muslims living in the U.S., following a news report detailing the spying by the U.S. National Security Agency and FBI.
Join us: