Bluetooth Can Be Cracked!
Nothing is completely safe today. Adobe has recently released a patch for a security hole in different graphical software, so why should Bluetooth be safe?
... and Bluetooth isn't safe off course! ;)
Two researchers of the Tel Aviv University School of Electrical Engineering Systems say they have discovered a technique for taking control of Bluetooth-enabled mobile phones. After you've established a connection with an other cell phone, the attacker can easily make calls with your phone. If there is a Bluetooth connection with a PC, the hacker can even transfer data between his Bluetooth device / cell phone and the hacked computer. Bluetooth can be very dangerous as you can see! Even when the handsets have security features switched on, your cell phone isn't save at all!
Avishai Wool, senior lecturer and Yaniv Shaked, graduate student and both researchers of the Tel Aviv University School of Electrical Engineering Systems have published recently a paper about three methods for forcing a repeat of the pairing process, "Cracking the Bluetooth PIN" ( http://www.eng.tau.ac.il/~yash/shaked-wool-mobisys05/ ). In this paper, a passive attack is described, in which an attacker can find the PIN used during the pairing process. The eye-opening conclusion of these two researchers: "Our results show that using algebraic optimizations, the most common Bluetooth PIN can be cracked within less than 0.06-0.3 seconds. If two Bluetooth devices perform pairing in a hostile area, they are vulnerable to this attack."
A Belgian Master student is making a fresh attempt to keep a list with Bluetooth security links on http://student.vub.ac.be/~sijansse/2e%20lic/BT/welcome.html.
Ollie Whitehousen security researcher of @stake, a digital security consulting firm ( http://www.atstake.com ) has written in October 2003 a paper that "examines methods of assessing the security of Bluetooth devices in relation to the protocol's design and implementation flaws" ( http://www.atstake.com/research/reports/acrobat/atstake_war_nibbling.pdf ).
In general, the most critical point is the 'pairing' - connection procedure of two Bluetooth devices. When a Bluetooth device asks you to re-enter the PIN number for re-pairing, once the two devices are re-connected, the hacker can now easily crack the PIN code.
For feedback on this article, please visit http://wallies.info/blog/item/145/index.html
Walter V. is a self-employed internet entrepreneur and founder-webmaster of several websites, including
This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news
Buying / Selecting Computer Components
This is the step takes the most time and consideration. Which parts do I buy? Which are best?There are many good places to buy computer parts.
How To Format A Hard Drive
Here's how to format a hard drive (Legal Stuff: We are not responsible for any damages, lost data, or anything of the sort)..
Blu-ray: A Primer
Blu-ray is an optical disc format which is set to rival HD-DVDin the race to be the de-facto standard storage medium for HDTV. The HD-DVD vs Blu-ray battle resembles that between Betamax and VHS and DVD+RW and DVD-RW.
The Top 10 Must-Have Laptop Accessories
You've laid out good money for your laptop computer, but you're not done spending just yet.There are a few more laptop accessories you may want to consider to make the package complete.
Cisco CCNA Certification: An Illustrated Guide To Ethernet CSMA/CD
When you're studying for your CCNA exams, you're going to study the theory of technologies we basically take for granted in networking. CSMA/CD is one of those technologies.
Your Business versus Mother Nature
Business Consultants earn hundreds of thousands of dollars every year showing businesses how to improve their productivity. All business consultants in the Information Technology area agree that the biggest threat to business survival is data loss.
How to Change, Upgade or Remove an IDE Hard Drive
Hard drives - Hard drives are a little more complicated. First off, you have to know what you want to do with the hard drive.
High Definition DVD
High definition DVD, also known as HD-DVD (which actually stands for High Density DVD), is one of two competing high definition storage format - the other being Blu-ray.The need for a new, high capacity storage format, has been primarily brought about by the rapid rise in popularity of HDTV in Japan and the US.
ATA vs SATA
Hard Drives: ATA versus SATAThe performance of computer systems has been steadily increasing as faster processors, memory, and video cards are continuously being developed. The one key component that is often neglected when looking at improving the performance of a computer system is the hard drive.
Laptop Security -Where'd My Laptop Go?
Laptops are lovely. They are convenient, mobile, powerful and prestigious.
Setting up a Network -- Wired or Wireless?
To Wire or Not to Wire Wireless networks are en vogue, but your installation won't be successful unless you chose the right type of network and set it up properly. Wired networks require that each computer be connected via a wire to a central location, called a switch or hub.
Flash Memory Part 2: MMC and SD
MMC and SDFlash memory is available in so many formats that it can be difficult to know what will work with any particular device. Devices such as MP3 players, PDAs, mobile phones, digital cameras, and personal computers can take advantage of flash memory to bolster their storage capacity, but selecting the right format may be easier said than done.
Used Laptop Computer: Your Quick Purchase Inspection Guide - Part 2
Used laptop computers are everywhere these days. How can you sift through the mass of available used laptop computers to narrow your search down to the right laptop for you? This is the second part of a series of articles designed to give you a few suggestions for your next purchase.
Routing, Routed, and Non-Routable Protocols
ROUTING PROTOCOLSA generic term that refers to a formula, or protocol, used by a router to determine the appropriate path over which data is transmitted. The routing protocol also specifies how routers in a network share information with each other and report changes.
Alternatives to Tape Backup
You may ask, isn't tape an anachronism in the age of optical disks, removable hard drives and a plethora of whiz-bang, random-access storage media? In many ways it is, but because of the nature of backup it doesn't really matter that tape is slow and sequential-access. Remember, tape is cheap.
The Road Ahead
We live in an area that has begun to use GreenBins for household waste. Our regular garbageis picked up every other week and the onlyweekly garbage collection is our green plasticbins, to be filled with leftover food productsand other organic waste.
Is A Laser Printer Right For Me?
The average home computer user definitely does not need a laser printer. Sure laser printer prices have fallen considerably in the last couple of years.
Best DVDs for Your Personal DVD Player
When bought personal DVD player, the very next thing to do is purchasing an important DVDs collection with your favourite movies, documentaries, shows, cartoons. Here are few hints before buying.
Learn How To Diagnose Power Supply Problems
The Power Supply convert's your regular household current into low DC voltage used by the computer. When this component fails,there is simply no activity going on wih your computer.
DVD CD ROMs have become predominantly the most used CD drive for desktop and notebook computers. They are very reliable and now come as a standard in most computers.
|home | site map|