When we hear term hacking, we usually think it’s attached with computer only. Now your computers are not only
hacked but your Bluetooth can be hacked too.
If someone hack your Bluetooth in that case hacker can steal your
contacts, personal files, pictures, restore factory setting or they can use your phone for calling and using internet.
Beside this they can access international mobile equipment identity number (IMEI), which they can use for cloning your cell phone. When your cell phone is cloned then your messages can be sent to other numbers. It will impact
the business world.
There are different
types of hacking such as
Bluejacking
Bluesnarfing
Bluebugging
Bluetoothing
Blueprinting
As with so many aspects of security, user awareness and vigilance is the best defence against the kinds of attacks described here.
The best way to protect a device, obviously, is to
simply turn Bluetooth off.
Prevention
If Bluetooth must be enabled, the user can set the device to be hidden .Setting a device to be invisible will still allow Bluetooth communications to function but will only allow connections to trusted devices that have been previously configured.
This protection is not perfect