Business Standard

Tuesday, December 24, 2024 | 05:04 AM ISTEN Hindi

Notification Icon
userprofile IconSearch

Bluebugging: How hackers use your Bluetooth-enabled devices to steal data

Understanding the mechanism of the crime and the steps you must take to evade it

cyber security, cyber attacks, cybersecurity, data, privacy, hackers, hacking
Premium

After bluejacking or bluesnarfing, hackers are using bluebugging to hijack devices and have access to the sensitive data on phones and laptops.

Harleen Kaur Jaggi New Delhi
Threats to cyber security have been increasing in recent times, with reports of cyberattacks making it to the headlines every other day. The surge in digitalisation has also seen an increasing number of people becoming victims of various malware attacks across the globe. Lack of awareness about such attacks can cause people to not only suffer huge financial losses, but can also see their most sensitive data getting compromised.

Today, with a rise in the use of Bluetooth-enabled devices such as AirPods and other TWS devices, and the use of Bluetooth in car stereos and even on smartphones, our devices

What you get on BS Premium?

  • Unlock 30+ premium stories daily hand-picked by our editors, across devices on browser and app.
  • Pick your 5 favourite companies, get a daily email with all news updates on them.
  • Full access to our intuitive epaper - clip, save, share articles from any device; newspaper archives from 2006.
  • Preferential invites to Business Standard events.
  • Curated newsletters on markets, personal finance, policy & politics, start-ups, technology, and more.
VIEW ALL FAQs

Need More Information - write to us at assist@bsmail.in