Hardware Information |
Bluetooth Can Be Cracked!
Nothing is completely safe today. Adobe has recently released a patch for a security hole in different graphical software, so why should Bluetooth be safe? ... and Bluetooth isn't safe off course! ;) Two researchers of the Tel Aviv University School of Electrical Engineering Systems say they have discovered a technique for taking control of Bluetooth-enabled mobile phones. After you've established a connection with an other cell phone, the attacker can easily make calls with your phone. If there is a Bluetooth connection with a PC, the hacker can even transfer data between his Bluetooth device / cell phone and the hacked computer. Bluetooth can be very dangerous as you can see! Even when the handsets have security features switched on, your cell phone isn't save at all! Avishai Wool, senior lecturer and Yaniv Shaked, graduate student and both researchers of the Tel Aviv University School of Electrical Engineering Systems have published recently a paper about three methods for forcing a repeat of the pairing process, "Cracking the Bluetooth PIN" ( http://www.eng.tau.ac.il/~yash/shaked-wool-mobisys05/ ).In this paper, a passive attack is described, in which an attacker can find the PIN used during the pairing process.The eye-opening conclusion of these two researchers: "Our results show that using algebraic optimizations, the most common Bluetooth PIN can be cracked within less than 0.06-0.3 seconds. If two Bluetooth devices perform pairing in a hostile area, they are vulnerable to this attack." A Belgian Master student is making a fresh attempt to keep a list with Bluetooth security links on http://student.vub.ac.be/~sijansse/2e%20lic/BT/welcome.html. Ollie Whitehousen security researcher of @stake, a digital security consulting firm ( http://www.atstake.com ) has written in October 2003 a paper that "examines methods of assessing the security of Bluetooth devices in relation to the protocol's design and implementation flaws" ( http://www.atstake.com/research/reports/acrobat/atstake_war_nibbling.pdf ). In general, the most critical point is the 'pairing' - connection procedure of two Bluetooth devices. When a Bluetooth device asks you to re-enter the PIN number for re-pairing, once the two devices are re-connected, the hacker can now easily crack the PIN code. Links: - http://www.atstake.com/research/reports/acrobat/atstake_war_nibbling.pdf - http://student.vub.ac.be/~sijansse/2e%20lic/BT/ - http://www.eng.tau.ac.il/~yash/shaked-wool-mobisys05/ For feedback on this article, please visit http://wallies.info/blog/item/145/index.html Walter V. is a self-employed internet entrepreneur and founder-webmaster of several websites, including
MORE RESOURCES: Unable to open RSS Feed $XMLfilename with error HTTP ERROR: 404, exiting |
RELATED ARTICLES
Setting up a Network -- Wired or Wireless? To Wire or Not to Wire Wireless networks are en vogue, but your installation won't be successful unless you chose the right type of network and set it up properly. Wired networks require that each computer be connected via a wire to a central location, called a switch or hub. Understanding Transistor Data and Replacement If, for some reason, you can't get an exact replacement for the transistor that you want to replace, you can refer to one of the transistor substitution guides or book, and try to identify a "near replacement". Beware, however. The Constantly Changing World of Inkjet Technology We have finally advanced to a time when technology can greatly improve graphics and printing. The technology we have at our disposal now is so advanced we are able to produce inkjet printers capable of printing proofs so accurate they can actually represent the end product. Printers Do you feel overwhelmed when buying a computer or a new printer?You are not alone. With so many products to choose from I know exactly how you feel. Adding USB 2.0 The process of adding USB 2.0 ports took no time and the backup system is mighty fast. Review of Logitech Computer Speakers When it comes to computer speaker systems, you have a lot of choice. However, there are simply some brands that stand way out in terms of sound quality and dependability, and one of those brands is certainly Logitech. Where does technology come from? Ever wonder where all the cool gadgets come from? Ever wonder who gets to try this stuff out first? Usually the war machine scientists get it first, try it out and find an application by using it for destruction; an obvious outlet for the human species and our desire to blow things up. It then moves into the private sector for important projects like, Microwave Ovens, Nuclear Energy, aviation space travel, telecommunications, Internet (which of course Al gore created first?), even Hummers, the ultimate SUV was created to cruise troops around in, Helicopters, hydrofoils, you name it man it came from military first. Ten Things Everyone Should Know about Ordering an Inkjet Cartridge Online It is true. You can save a lot of time and money by ordering your next inkjet cartridge online. A Review of Refurbished HP Laptops HP refurbished laptops can be found on their website hpshopping.com. Computer Network Installation Computer network installation has become an essential prerequisite for any efficient modern-day business as it allows employees to truly work as a team by sharing information, accessing the same database and staying in touch constantly. For a computer network to give the best results, a lot of detailed planning and foresight is required before installation. Obsolete Is A Dirty Word (Intel Pentium 64 Bit Microchip) Get ready everyone, home computers are about to set new LAN speed records! The Intel 64-bit microchip will soon be powering the new line of Pentium 4 computers. This long awaited sizzling fast release will be heading to store shelves across America just in time for the new blazing fast Windows 64-bit operating system. Build Your First Computer from Hardware Scratches Wow- if you do it first time and have some asset of time in your disposition - then go ahead and purchase motherboard, your favorite processor, memory, video card (probably it is better to purchase it external for advanced quality). You will also need computer case - first computer should probably go to the cheap one - with USB 2 ports from the front side - the only question - you might want to replace noisy cheap power supply with $50 dollars one. Video Cards: Is AGP Dead? If you've been looking to upgrade your computer video card you've probably heard a great deal about PCI Express and SLI. Don't run out and buy a new computer just yet and take that AGP motherboard you just threw away out of the trash. Laptop Computer Extras for the Mobile Traveler A laptop computer certainly provides you with an unprecedented level of freedom and mobility away from the office. However there are a few extras you might want to bring along on your laptop travels:Extra 1: portable printerIf you travel a lot, you never know when you might need to commit one of your digital documents to paper. Does Size Really Matter In Our Digital Age? Well, we've all seen the advert, but that's not what I want to talk about, so get that out of your head straight away. No, let's think about what many call the "Queen of Arts" - namely painting. A Review of Brother Laser Toners Brother is right up there with HP and Samsung as one of the most sought-after brands of laser toner. The Japan-based Brother Industries was first famous for its sewing machines. Quality Recovery and Rework - When It All Goes Wrong When Quality is the Target, but not the Result, what do you do?While Quality may be the overarching goal of all production, stuff happens, resulting in non-conforming parts. This results in failure verification, rework, recalls, sorting, kitting, retest, relabeling and pipeline management, which are facts of life in the manufacturing, assembly and production world we live in. Portable MP3 Player Based Education A revolution in learning technology has taken place. Actually, it took place a few years ago, and I'm only just now catching up. A Guide to Refurbished Laptops Computing freedom, independence, and mobility don't have to come with a hefty price tag.Manufacturers refurbish laptop computers that have been returned. RAID Disk Recovery RAID is short for Redundant Array of Independent (or Inexpensive) Disks, a category of disk drives that employ two or more drives in combination for fault tolerance and performance. RAID disk drives are used frequently on servers and increasingly being employed on personal computers. |
home | site map | Contact Us |