SlideShare a Scribd company logo
1 of 3
THE DAILY NEWS
SATURDAY
22 September
2021
www.dailytechnologynews.com
Bluetooth Attacks and Security Tips – Awareness Results in
Better Protection
The history of Bluetooth is quite recent – the 1990s, to be
exact. Ericsson, a Swedish multinational active in the
networking and telecommunications domain, developed
Bluetooth. The name ‘Bluetooth’ comes from a renowned
10th century Danish King, Harald “Bluetooth” Gormsson,
responsible for uniting Norway and Denmark. The
Bluetooth logo is a combination of Harald’s initials.
Dr. Jaap Haarsten is the man credited with conceiving the
idea for Bluetooth, and while it was invented in 1994, the
first Bluetooth enabled consumer product was only
launched five years later in 1999. This a was a hands-free
mobile headset,and its launch was followed by the launch
of Bluetooth-enabled dongles and mice, with the first
Bluetooth-equipped mobile phone hitting the shelves in
2000.
The evolution in Bluetooth has been swift since it
came into being in the 1990s: at first limited in
reach, it has become an all-encompassing
standard that caters to multiple use cases.From
wireless music to file sharing, from device
pairing to household appliances and accessories,
the standard covers a gamut of uses.
Bluetooth can be a security risk
Any technology that has a massive and ever-
increasing market penetration will inevitably be
on the radar of hackers and cybercriminals. Their
focus is always on the number of peopleusing a
specific technology, it’s reach, and leverage. It’s
no surprisethen that there are plenty of security
risks associated with Bluetooth.
Bluetooth works by establishing a Wireless Personal Area
Network (WPAN) to connect Bluetooth enabled devices
with one another. Bluetooth-connected devices share data
with one another and you want this data to be safe and
secure. Moreover, you don’t want criminals to gain access
to your Bluetooth-enabled devices. There is a critical need
for us to be aware of the associated risks so that we can take
steps definitive steps to protect us against Bluetooth attacks.
Some common types of Bluetooth attacks:
BlueJacking
Yep, no prizes for guessing it is a combination of two
words – Bluetooth and hijacking. This is a typeof attack
in which a Bluetooth-enabled device hijacks another
Bluetooth device to send spamadvertising.
Imagine youare in a public place with the Bluetoothon your
Imagine you are in a public place with the Bluetooth on your
device switched on. There is a criminal at work in the public
space with a BlueJacking device, and they pair thedevice with
yours and starts to spend spam-styleadvertising messages. At
face value, this problem sounds like an annoyance more than
anything else, but what if one of these messages contains a
malicious link? Or is a carefully crafted message that convinces
you to share sensitive personalinformation?A BlueJacking
attempt can go from an annoyance to a critical security issue.
THE DAILY NEWS
SATURDAY
22 September
2021
BlueSmacking (A DoS or denial-of-service attack)
A DoS attack involves a server or device receiving a truckload of data
packets, or even over-sized data packets it finds difficult to handle. The
result is that thedevice shuts down or malfunctions. What if your
Bluetooth device is considered important enough to launch a denial-of-
service (DoS) attack against?
This is not as farfetched as it sounds. Today,
mobile devices are not just used for calling or
sending messages. Phones, tablets, and laptops are
being used to storeimportant information and
execute programs that have a direct impact on a
business-critical project. Now imagine a
BlueSmacking attack against numerous such
devices that are a part of a single organization.
BlueSnarfing
This is the more ‘frightening’ version of ‘BlueJacking’. While the latter
sends data, theBlueSnarfing steals data. As in all attacks which aim to
gain unauthorized access to data, you won’t realize someone has
accessed your data until it is too late.
Picture a scenario in which you are at the airport and having some free
time on your hands before you board your flight, you decide to get some
work done.
Unbeknownst to you, the person sitting next
to you is a hacker who is just waiting for an
opportunity to BlueSnarf unsuspecting users
such are yourself. If your Bluetooth is
switched on, your device is paired
clandestinely and thedata on your device is
accessed, which can include emails, text
messages, and much more.
Eavesdropping
We are living in a world where we are working from home and
attending numerous business meetings throughout theday. Many of the
headsets we use are Bluetooth enabled. Criminals can exploit
vulnerabilities in such headsets and eavesdrop on your conversations.
Here’s the really scary bit. Hackers can
eavesdrop on theconversations you are
having with the peoplearound you as well.
This is the kind of breach of privacy that
can result in bigger problems.
THE DAILY NEWS
SATURDAY
22 September
2021
The ‘opensesame’ bug
Cybercriminals can also create a backdoor on your device or laptop using Bluetooth. Once a backdoor has been
established,the attacker can have a field day as they can access all manner of sensitive information stored on this
device. You won’t realize it, but a criminal can spy on all youractivities on the device. Imagine the potential for
havoc.
How do you protect yourself?
Now that you know the security risks, how do you protect yourself?It’s not that difficult if you take the basic steps.
 Always be very aware of where your device is. Do not misplace it or forget about where you have kept it. This is
super important if you are working from a public space. Also, if you do lose your phone, make sure you can
easily lock it remotely.
 Get into the habit of not using Bluetooth to transfer sensitive information. If you do share important files, encrypt
them first.
 If you are not using your Bluetooth, turn it off. When you do this, you switch off a possiblecyberattack vector.
Documentery made by:-
Shravani S.Patil
Class:- 9th
A Roll no.:-12

More Related Content

What's hot

ISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloISSC456_Final_J_Intindolo
ISSC456_Final_J_Intindolo
John Intindolo
 
FUTURE SCHLOCK Joyce Schwarz LA FUTURISTS TALK
FUTURE SCHLOCK Joyce Schwarz LA FUTURISTS TALKFUTURE SCHLOCK Joyce Schwarz LA FUTURISTS TALK
FUTURE SCHLOCK Joyce Schwarz LA FUTURISTS TALK
Joyce Schwarz
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivism
Bilal Ali
 
Stop in the name of norton
Stop in the name of nortonStop in the name of norton
Stop in the name of norton
spkiely
 

What's hot (18)

Cyber Warfare - Milan 2015
Cyber Warfare - Milan 2015Cyber Warfare - Milan 2015
Cyber Warfare - Milan 2015
 
Mobileteleseczabout
MobileteleseczaboutMobileteleseczabout
Mobileteleseczabout
 
Bluetooth Hacking
Bluetooth HackingBluetooth Hacking
Bluetooth Hacking
 
ISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloISSC456_Final_J_Intindolo
ISSC456_Final_J_Intindolo
 
FUTURE SCHLOCK Joyce Schwarz LA FUTURISTS TALK
FUTURE SCHLOCK Joyce Schwarz LA FUTURISTS TALKFUTURE SCHLOCK Joyce Schwarz LA FUTURISTS TALK
FUTURE SCHLOCK Joyce Schwarz LA FUTURISTS TALK
 
Lesson2.9 n u2l6 public keys
Lesson2.9 n u2l6 public keysLesson2.9 n u2l6 public keys
Lesson2.9 n u2l6 public keys
 
עומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגת
עומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגתעומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגת
עומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגת
 
Mobile phones are nuisance
Mobile phones are nuisanceMobile phones are nuisance
Mobile phones are nuisance
 
Crime & technology
Crime & technologyCrime & technology
Crime & technology
 
Cscs (4)
Cscs (4)Cscs (4)
Cscs (4)
 
Evolution of information security
Evolution of information securityEvolution of information security
Evolution of information security
 
Do’s & don’ts of computer security rough
Do’s & don’ts of computer security  roughDo’s & don’ts of computer security  rough
Do’s & don’ts of computer security rough
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivism
 
Smartphone safety
Smartphone safetySmartphone safety
Smartphone safety
 
Earthmouse: Mobile Guardian
Earthmouse: Mobile GuardianEarthmouse: Mobile Guardian
Earthmouse: Mobile Guardian
 
Information security consciousness
Information security consciousnessInformation security consciousness
Information security consciousness
 
It hotspot shield new
It hotspot shield newIt hotspot shield new
It hotspot shield new
 
Stop in the name of norton
Stop in the name of nortonStop in the name of norton
Stop in the name of norton
 

Similar to Bluetooth Attacks.docx

Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threat
Ali J
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
HAYDEECAYDA
 
11Wireless SecurityHere is a sample research paper that I .docx
11Wireless SecurityHere is a sample research paper that I .docx11Wireless SecurityHere is a sample research paper that I .docx
11Wireless SecurityHere is a sample research paper that I .docx
hyacinthshackley2629
 
Bluejacking sadhana
Bluejacking sadhanaBluejacking sadhana
Bluejacking sadhana
Sadhana28
 

Similar to Bluetooth Attacks.docx (20)

Blue jacking
Blue jackingBlue jacking
Blue jacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Blue Jacking
Blue Jacking Blue Jacking
Blue Jacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking by Niharika Mundra
Bluejacking  by Niharika MundraBluejacking  by Niharika Mundra
Bluejacking by Niharika Mundra
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
blue-JACKING.pptx
blue-JACKING.pptxblue-JACKING.pptx
blue-JACKING.pptx
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threat
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
 
11Wireless SecurityHere is a sample research paper that I .docx
11Wireless SecurityHere is a sample research paper that I .docx11Wireless SecurityHere is a sample research paper that I .docx
11Wireless SecurityHere is a sample research paper that I .docx
 
Device Hacking
Device HackingDevice Hacking
Device Hacking
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
 
Cyber Security: Stalking Prey: An RF Hackers Perspective
Cyber Security: Stalking Prey: An RF Hackers Perspective Cyber Security: Stalking Prey: An RF Hackers Perspective
Cyber Security: Stalking Prey: An RF Hackers Perspective
 
Bluejacking sadhana
Bluejacking sadhanaBluejacking sadhana
Bluejacking sadhana
 
Blue Jacking
Blue JackingBlue Jacking
Blue Jacking
 

More from Shravani Patil

More from Shravani Patil (8)

Taekwondo - The Korean Martial Art.ppsx
Taekwondo - The Korean Martial Art.ppsxTaekwondo - The Korean Martial Art.ppsx
Taekwondo - The Korean Martial Art.ppsx
 
Sun Temple.pptx
Sun Temple.pptxSun Temple.pptx
Sun Temple.pptx
 
Tabla Presentation.pptx
Tabla Presentation.pptxTabla Presentation.pptx
Tabla Presentation.pptx
 
India's Famous Hindi Author.pptx
India's Famous Hindi Author.pptxIndia's Famous Hindi Author.pptx
India's Famous Hindi Author.pptx
 
Poverty As A Challenge.pptx
Poverty As A Challenge.pptxPoverty As A Challenge.pptx
Poverty As A Challenge.pptx
 
Aves Presentation for class 9.pptx
Aves Presentation for class 9.pptxAves Presentation for class 9.pptx
Aves Presentation for class 9.pptx
 
𝑰𝒏𝒇𝒐𝒓𝒎𝒂𝒕𝒊𝒐𝒏 𝒐𝒇 𝑶𝒅𝒊𝒔𝒔𝒊 𝑪𝒍𝒂𝒔𝒔𝒊𝒄𝒂𝒍 𝑴𝒖𝒔𝒊𝒄
𝑰𝒏𝒇𝒐𝒓𝒎𝒂𝒕𝒊𝒐𝒏 𝒐𝒇 𝑶𝒅𝒊𝒔𝒔𝒊 𝑪𝒍𝒂𝒔𝒔𝒊𝒄𝒂𝒍 𝑴𝒖𝒔𝒊𝒄𝑰𝒏𝒇𝒐𝒓𝒎𝒂𝒕𝒊𝒐𝒏 𝒐𝒇 𝑶𝒅𝒊𝒔𝒔𝒊 𝑪𝒍𝒂𝒔𝒔𝒊𝒄𝒂𝒍 𝑴𝒖𝒔𝒊𝒄
𝑰𝒏𝒇𝒐𝒓𝒎𝒂𝒕𝒊𝒐𝒏 𝒐𝒇 𝑶𝒅𝒊𝒔𝒔𝒊 𝑪𝒍𝒂𝒔𝒔𝒊𝒄𝒂𝒍 𝑴𝒖𝒔𝒊𝒄
 
Conservation of water ppt by shravani patil
Conservation of water ppt by shravani patilConservation of water ppt by shravani patil
Conservation of water ppt by shravani patil
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

Bluetooth Attacks.docx

  • 1. THE DAILY NEWS SATURDAY 22 September 2021 www.dailytechnologynews.com Bluetooth Attacks and Security Tips – Awareness Results in Better Protection The history of Bluetooth is quite recent – the 1990s, to be exact. Ericsson, a Swedish multinational active in the networking and telecommunications domain, developed Bluetooth. The name ‘Bluetooth’ comes from a renowned 10th century Danish King, Harald “Bluetooth” Gormsson, responsible for uniting Norway and Denmark. The Bluetooth logo is a combination of Harald’s initials. Dr. Jaap Haarsten is the man credited with conceiving the idea for Bluetooth, and while it was invented in 1994, the first Bluetooth enabled consumer product was only launched five years later in 1999. This a was a hands-free mobile headset,and its launch was followed by the launch of Bluetooth-enabled dongles and mice, with the first Bluetooth-equipped mobile phone hitting the shelves in 2000. The evolution in Bluetooth has been swift since it came into being in the 1990s: at first limited in reach, it has become an all-encompassing standard that caters to multiple use cases.From wireless music to file sharing, from device pairing to household appliances and accessories, the standard covers a gamut of uses. Bluetooth can be a security risk Any technology that has a massive and ever- increasing market penetration will inevitably be on the radar of hackers and cybercriminals. Their focus is always on the number of peopleusing a specific technology, it’s reach, and leverage. It’s no surprisethen that there are plenty of security risks associated with Bluetooth. Bluetooth works by establishing a Wireless Personal Area Network (WPAN) to connect Bluetooth enabled devices with one another. Bluetooth-connected devices share data with one another and you want this data to be safe and secure. Moreover, you don’t want criminals to gain access to your Bluetooth-enabled devices. There is a critical need for us to be aware of the associated risks so that we can take steps definitive steps to protect us against Bluetooth attacks. Some common types of Bluetooth attacks: BlueJacking Yep, no prizes for guessing it is a combination of two words – Bluetooth and hijacking. This is a typeof attack in which a Bluetooth-enabled device hijacks another Bluetooth device to send spamadvertising. Imagine youare in a public place with the Bluetoothon your Imagine you are in a public place with the Bluetooth on your device switched on. There is a criminal at work in the public space with a BlueJacking device, and they pair thedevice with yours and starts to spend spam-styleadvertising messages. At face value, this problem sounds like an annoyance more than anything else, but what if one of these messages contains a malicious link? Or is a carefully crafted message that convinces you to share sensitive personalinformation?A BlueJacking attempt can go from an annoyance to a critical security issue.
  • 2. THE DAILY NEWS SATURDAY 22 September 2021 BlueSmacking (A DoS or denial-of-service attack) A DoS attack involves a server or device receiving a truckload of data packets, or even over-sized data packets it finds difficult to handle. The result is that thedevice shuts down or malfunctions. What if your Bluetooth device is considered important enough to launch a denial-of- service (DoS) attack against? This is not as farfetched as it sounds. Today, mobile devices are not just used for calling or sending messages. Phones, tablets, and laptops are being used to storeimportant information and execute programs that have a direct impact on a business-critical project. Now imagine a BlueSmacking attack against numerous such devices that are a part of a single organization. BlueSnarfing This is the more ‘frightening’ version of ‘BlueJacking’. While the latter sends data, theBlueSnarfing steals data. As in all attacks which aim to gain unauthorized access to data, you won’t realize someone has accessed your data until it is too late. Picture a scenario in which you are at the airport and having some free time on your hands before you board your flight, you decide to get some work done. Unbeknownst to you, the person sitting next to you is a hacker who is just waiting for an opportunity to BlueSnarf unsuspecting users such are yourself. If your Bluetooth is switched on, your device is paired clandestinely and thedata on your device is accessed, which can include emails, text messages, and much more. Eavesdropping We are living in a world where we are working from home and attending numerous business meetings throughout theday. Many of the headsets we use are Bluetooth enabled. Criminals can exploit vulnerabilities in such headsets and eavesdrop on your conversations. Here’s the really scary bit. Hackers can eavesdrop on theconversations you are having with the peoplearound you as well. This is the kind of breach of privacy that can result in bigger problems.
  • 3. THE DAILY NEWS SATURDAY 22 September 2021 The ‘opensesame’ bug Cybercriminals can also create a backdoor on your device or laptop using Bluetooth. Once a backdoor has been established,the attacker can have a field day as they can access all manner of sensitive information stored on this device. You won’t realize it, but a criminal can spy on all youractivities on the device. Imagine the potential for havoc. How do you protect yourself? Now that you know the security risks, how do you protect yourself?It’s not that difficult if you take the basic steps.  Always be very aware of where your device is. Do not misplace it or forget about where you have kept it. This is super important if you are working from a public space. Also, if you do lose your phone, make sure you can easily lock it remotely.  Get into the habit of not using Bluetooth to transfer sensitive information. If you do share important files, encrypt them first.  If you are not using your Bluetooth, turn it off. When you do this, you switch off a possiblecyberattack vector. Documentery made by:- Shravani S.Patil Class:- 9th A Roll no.:-12