What are Bluetooth security threats in Security+?

D2 ยท Threats  ยท  CompTIA Security+ SY0-701
Common Bluetooth attacks:

๐Ÿ“ฉ Bluejacking โ€” sends unsolicited messages to a Bluetooth device (annoying but harmless)
๐Ÿ“‚ Bluesnarfing โ€” unauthorized access to data (contacts, emails, calendar) via Bluetooth
๐ŸŽฎ Bluebugging โ€” full device control, including calls, messages, and eavesdropping
๐Ÿ”ต Bluetooth Eavesdropping โ€” passively captures Bluetooth traffic
๐Ÿ‘ฟ BIAS attack โ€” impersonates a previously paired device

Mitigation: disable Bluetooth when not needed, use non-discoverable mode, enable Bluetooth authentication.
Know the three main Bluetooth attack names and what each does. Bluesnarfing and bluebugging are the most serious. Setting a device to non-discoverable mode reduces (but doesn't eliminate) risk. Bluetooth range is typically 10-100 meters.
โ† Back to Glossary Practice Questions โ†’