There are billions of Bluetooth devices on the market today. In fact, it is almost harder to find a device that doesn’t have Bluetooth. Over the last several years devices with Bluetooth show up in the following:
Due to implementation of millions of Bluetooth devices in use, malicious security violations are now common events these days and expected to increase in the future.
The increased usage of Bluetooth devices makes security concerns even more alarming. Like any other wireless communication system Bluetooth transmission can be deliberately jammed or intercepted. False or modified information could be sent to the users by the attacker.
Some important common vulnerabilities are listed below:
Depending on your specific device, you’ll have different Bluetooth options and settings available, but the same general advice applies to all. If your Bluetooth device is not paired with another Bluetooth device at any time, turn its Bluetooth capability off to avoid an unknown device from trying to connect to it. Even if you are paired with a device, you should still turn off Bluetooth discovery (so other devices can’t see your phone) as well as auto pairing (which can allow a device you’re not familiar with to connect to your phone without your approval).
Policyholders who suspect they are victims of fraud should contact their local IMT Group Agent or The IMT Group directly at 800-274-3531 to find out how they can work with a fraud specialist to help manage and protect their identity.Copyright 2018 CyberScout