Privacy and security seems to always be on everyone’s mind today. Intuitively we are always making sure our homes are locked before we leave and that our cars when left aren’t vulnerable to any intruders. Just like our homes and cars, we keep our technological devices secure and locked with some sort of authentication, but they too have a variety of different entrances for an intruder to sneak their way in.
The most popular digital entrance into a electronic device today is through its Wifi. We have all heard of the horror stories of connecting to a wrong network in a public place and having your personal information stolen. But few people think about how their Bluetooth can be effected.
Minimizing your Bluetooth usage minimizes your exposure to the vulnerabilities. Most recently, an attack called BlueBorne allows for any affected device with Bluetooth turned on to be attacked through a series of vulnerabilities. These vulnerabilities don’t stem from the Bluetooth itself but the implementation in all the of the software including Windows, Andriod, Linux and iOS. This potentially puts millions at risk.
The Blueborn attack starts by going through the process by scanning devices with Bluetooth on, it then starts probing them for information such as device type and operating system to see if they have the vulnerabilities it can latch on to. The Blueborn bug can allow hackers to take control of a device and access private information. This attack can also spread from device to device in one motion if other vulnerable Bluetooth enabled targets are nearby.
The best defense against this Bluetooth security flaw is to make sure your device system is always updated with the latest software and firmware. This make sure there are no vulnerabilities in the implementation of Bluetooth within your operating system. Bluetooth does many amazing things that seem almost magical and the benefits outweigh the calculated risk of turning it on. However when not in use it is best to make sure to keep your Bluetooth setting off and use it when you know you are in a safe and secure area.
Hacking comes in many forms, recently the trend in cyber crime has hackers going directly for the supply chain within an organization. The supply chain is a system of activities involved in handling, distributing, manufacturing and processing goods in order to move resources from a vendor into the hands of a final consumer. In reference to cyber-security, a supply chain attack involves tampering with the companies network in order to install malware that brings harm further down the supply chain.
These event have happened all to often, and can affect such a large group of users. These events are particularly a cause for concern to business owners. If your business computers are not being monitored and one of your employees accidentally downloads malicious software unknowingly, all of your important business data is now compromised. Not only is your data at risk, now your business if loosing precious hours trying to fix the problem and recovering from the cyber attack instead of focusing on your core business activities. These event could plummet employee productivity and could end up costing the business money that it simply cannot afford to lose. Be sure to always monitor end user activity and maintain backups of your important data.



