The cheap, low-power radio connection known as Bluetooth is increasingly appearing in smart phones and other mobile devices, making it easier to connect phones, PDAs, headsets, printers, and notebooks to each other. Cell-phone makers tout being able to wirelessly sync contacts on a PC and smart phone. Yet at the same time, security concerns about the communication protocol are on the rise.
Worldwide shipments of Bluetooth chipsets hit 35.8 million units in 2002, market research firm In-Stat/MDR says, and it's projecting 74% annual growth in Bluetooth chipsets through 2007. More than half of all new cell phones purchased next year will come with Bluetooth capability, market analysts predict.
During the past year, security researchers have demonstrated how it's possible to steal data such as Short Message Service messages, phone books, and scheduling information through an attack called Bluesnarfing. Another attack, known as Bluebugging, involves using a Bluetooth connection to remotely commandeer a phone and have the phone call the attacker. Once the connection is made, the attacker can eavesdrop on the phone's owner.
When Mikko Hypponen, director of antivirus research at F-Secure Corp., tests Bluetooth-capable worms to see how easily they spread, you'd think he was handling radioactive material. "Testing these things is tricky. We can't test them in normal labs," he says. "These can fly through walls, and the sales guy one floor up may have Bluetooth and get infected. When we test these things for real we go to a radio-proof lab about a half-kilometer from our office."
Such vulnerabilities are turning some companies away from the technology. "Bluetooth is extremely insecure," says Jeff Nigriny, chief security officer with Exostar LLC, an online exchange. "By policy, we don't allow Bluetooth."
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.