By Heather Weidner
Bluetooth and wireless technology have made our lives so much easier. We’re no longer tethered to a device, and we can be portable. Bluetooth is now an everyday part of our lives in headphones, keyboards, cars, personal digital assistants, TV, and the list goes on and on.
Where the Name Came From - The trademark for this technology is named for King Harold “Bluetooth” Gormsson, who united Denmark and Norway in 958. He had a bad, discolored tooth that led to his nickname. King Harold was one of the last Viking kings to rule over Denmark, Norway, and parts of Germany and Sweden, and he is buried in Poland.
Here are some things you need to be aware of to keep your devices safe from bad actors.
Bluejacking - This is a term to describe when someone sends unsolicited or unwanted messages through Bluetooth on your wireless devices. It’s a nuisance, and it could be dangerous if the message has viruses or other malware.
Bluesnarfing - This describes when a hacker gets access to one or more of your wireless devices and can steal information.
Bluebugging - This is when a hacker takes control of your devices through your Bluetooth. They have full access to your device and its information. This can include anything from full access to your texts and contacts to listening or watching you through a camera.
Things You Can Do
- If you don’t need wireless access to a device, turn it off.
- Don’t accept pairing requests (the process that allows your wireless device to connect) from sources that you don’t know.
- Know what Bluetooth devices you have and the ones that are paired with your network.
- Know your environment or surroundings when you are using Bluetooth. Are you in a very public place with lots of people nearby? Remember, hackers don’t have to be at the table next to you.
- Review your device’s security settings and security options before you pair your device. Take advantage of options to secure your devices.
Technology brings so many efficiencies and opportunities, but it does have its share of risks. Make sure that you’re aware of your security settings and who or what has access to your devices.
Through the years, Heather Weidner has been a cop’s kid, technical writer, editor, college professor, software tester, and IT manager. She writes the Pearly Girls Mysteries, the Delanie Fitzgerald Mysteries, The Jules Keene Glamping Mysteries, and The Mermaid Bay Christmas Shoppe Mysteries. You can find out more about her at her website.
Gah. Just when I was starting to think I'd secured my wifi with a VPN, now I have to worry about Bluetooth. BTW, I already knew about the name coming from a Viking king. The Bluetooth symbol was derived from his initials, too, I believe.
ReplyDeleteEducating, but scary. Another thing to beware of…..
ReplyDeleteNow I just have to figure out what Bluetooth is. Guess it shows what a Luddite I am. But at least I don't have to worry about any of these things right now.
ReplyDeleteThanks for the info on Bluetooth, Heather. My favorite use of Bluetooth is being able to link the digital books on my iPhone to my car speakers.
ReplyDeleteGreat tips, Heather. Love the history lesson and the hacking names.
ReplyDeleteAs for me, I hate trailing wires everywhere. Headphones, Keyboards, mice, and the like are all bluetooth.
Storing the information, hoping I never need it.
ReplyDeleteExcellent information for those who think bluetooth is "safe."
ReplyDeleteThanks so much! Y'all be safe out there.
ReplyDelete