Bluetooth

Bluetooth BluetoothAn industry standard for short-range wireless connections between devices like mobile phones, headsets, computers and PDAs. technology can make your life easier by letting you to wirelessly connect your devices. But if you’re not careful, a cyber criminal can easily join the party.

 

Don’t let the Bluetooth bite

Wired devices are quickly becoming a thing of the past. More and more phones, laptops, and tablets are ditching the wires and encouraging the use of wireless Bluetooth devices like printers, headphones, and keyboards.

Since many of your devices carry sensitive data, you'll want to take extra care when connecting with Bluetooth, particularly in public places. If hackers can detect your Bluetooth, it's also possible for them to hack your device.


Risks to you

Hacking

Hacking HackingHacking is a term used to describe actions taken by someone to gain unauthorized access to a device. The availability of information online on the tools, techniques, and malware makes it easier for even non-technical people to undertake malicious activities. is any action taken to get unauthorized access to a device or account.

When you turn on your Bluetooth, your device becomes discoverable to other Bluetooth enabled devices within range. This can make your device vulnerable to malicious users who are trying to gain access to your information. To help protect your device and your data, always turn Bluetooth off when you’re not using it.

Malware

Malware MalwareMalicious software ("malware") designed to infiltrate or damage a computer system, without the owner's consent. Common forms of malware include computer viruses, worms, Trojans, spyware, and adware. It can: • Intimidate you with scareware, which is usually a pop-up message that tells you your computer has a security problem or other false information. • Reformat the hard drive of your computer causing you to lose all your information. • Alter or delete files. • Steal sensitive information. • Send emails on your behalf. • Take control of your computer and all the software running on it. is malicious software SoftwareA computer program that provides instructions which enable the computer hardware to work. System software, such as Windows, Linux or MacOS, operate the machine itself, and applications software, such as spreadsheet or word processing programs, provide specific functionality. designed to infiltrate your device.

Malware, like viruses, can spread through Bluetooth connections. Viruses can have a harmful effect on your device by allowing your data to be stolen.

Lock up your linked devices

"a large Bluetooth symbol with a large red X in the centre, and notifications with eyes"

Turn Bluetooth off

Two devices using Bluetooth have to "see" each other before they can connect. Unless you need to use it, always set your device’s Bluetooth to hidden or undiscoverable mode so hackers or strangers can't connect to your device, especially in crowded or public areas.

"dialogue boxes with eyes looking at each other, with update circles"

Don’t connect with strangers

You should never use Bluetooth to connect to unknown, untrusted, or suspicious sources and you should never accept files from these devices.

"a person holding a tablet with dialogue bubbles surrounding him"

Unpair your devices

If one of your Bluetooth devices is lost or stolen, make sure to delete it from your list of paired devices right away on all your other Bluetooth devices. Since they are all connected, one lost device can provide access to the rest.


Resources

How to secure your smart devices against cyber threats this summer

How to secure your smart devices against cyber threats this summer

Gearing up for another summer at home with your smart devices? Here’s how you can secure them against cyber threats.

Blogs

Blogs

Read up on the latest cyber threats and tips for keeping yourself, your family and your business cyber safe.

Resources

Resources

Visual learner? Check these out for tips and tricks to keep yourself, your family and your business secure from cyber threats.

Become a champion

Become a champion

Become a Get Cyber Safe champion to help improve internet security for yourself, your organization, and all Canadians.

Date modified: