21st Century Learning and Teaching
585.8K views | +10 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tag: 'Bluetooth'. Clear
Scooped by Gust MEES
Scoop.it!

Learning basics of Cybersecurity: Bluetooth technology and mobile phones - the risks

Attacks on Bluetooth-enabled devices can take place within a distance of 10 metres or more. Stay safe by installing firewalls and Kaspersky mobile phone antivirus software.

As many as three-quarters of mobile phone users are not aware of the internet security risks linked to Bluetooth-equipped devices. These risks come in four main guises:

 

- Bluejacking is when anonymous text messages are sent to mobile phones


- Bluespamming is when a phone’s contacts are secretly sent text messages


- Bluesnarfing is when hackers gain access to a mobile phone’s contacts


- Bluebugging is when hackers have access to a handset’s commands


While each of these risks is a nuisance, bluesnarfing and bluebugging are particularly serious. With bluesnarfing, hackers can gain access to stored data, such as a phonebook, calendar or to clone a phone.

 

Read more, a MUST:

http://www.kaspersky.com/threats/bluetooth-risks

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Learning basics of Cybersecurity: Les dangers de Bluetooth vus par le NIST

Learning basics of Cybersecurity: Les dangers de Bluetooth vus par le NIST | 21st Century Learning and Teaching | Scoop.it

A noter, en milieu de document, une taxonomie des différentes vulnérabilités recensées (tableau 4.1). Du PIN d’accès trop court à l’absence de gestion de ces codes d’accès, sans oublier la réutilisation des clefs de chiffrement, le mauvais stockage des « link keys », les demandes d’authentification répétitives, les clefs « partagées » etc… Le club des fans de Thierry Zoller et de son BTCrack retrouvera là tout ce qui se dit et se répète depuis des années.

 

En savoir plus :

 

http://www.cnis-mag.com/les-dangers-de-bluetooth-vus-par-le-nist.html

 

No comment yet.