
What is bluebugging, and how is it used to hack Bluetooth-enabled devices?
The HinduNovember 28, 2022 10:30 am | Updated December 10, 2022 11:47 am IST The story so far: Cybersecurity experts note that apps that let users connect smartphones or laptops to wireless earplugs can record conversations, and are vulnerable to hacks. Any app with access to Bluetooth can record users’ conversations with Siri and audio from the iOS keyboard dictation feature when using AirPods or Beats headsets, some app developers say. Turning off Bluetooth and disconnecting paired Bluetooth devices when not in use, updating the device’s system software to the latest version, limiting the use of public Wi-Fi, and using VPN as an additional security measure are some of the ways to prevent bluebugging, Shubho Pramanik, senior vice president, Applied Cloud Computing, a Thane based cloud service provider, said to The Hindu. Today, several smartphones have their Bluetooth settings on discovery mode, making it easy for hackers to access the phones when they are within 10 metres from the device.
History of this topic

Using TWS or Bluetooth devices? Here's how you can safeguard yourself from Bluetooth hacking
India Today
What is Bluebugging and how do hackers use it? Learn how to secure your devices
Firstpost
Bluetooth might be helping hackers to get into your phone
India TV News
New flaw lets hackers snoop on you using Bluetooth
India Today
Bluetooth Enabled Devices Unsafe: Symantec
Firstpost
'Rifle' Sniffs Out Vulnerability in Bluetooth Devices
NPRDiscover Related

























