Business Standard

Bluebugging: How hackers use your Bluetooth-enabled devices to steal data

Understanding the mechanism of the crime and the steps you must take to evade it

cyber security, cyber attacks, cybersecurity, data, privacy, hackers, hacking
Premium

After bluejacking or bluesnarfing, hackers are using bluebugging to hijack devices and have access to the sensitive data on phones and laptops.

Harleen Kaur Jaggi New Delhi
Threats to cyber security have been increasing in recent times, with reports of cyberattacks making it to the headlines every other day. The surge in digitalisation has also seen an increasing number of people becoming victims of various malware attacks across the globe. Lack of awareness about such attacks can cause people to not only suffer huge financial losses, but can also see their most sensitive data getting compromised.

Today, with a rise in the use of Bluetooth-enabled devices such as AirPods and other TWS devices, and the use of Bluetooth in car stereos and even on smartphones, our devices

Don't miss the most important news and views of the day. Get them on our Telegram channel

First Published: Nov 29 2022 | 7:15 PM IST

Explore News

To read the full story, subscribe to BS Premium now, at just Rs 249/ month.

Key stories on business-standard.com are available only to BS Premium subscribers.

Register to read more on Business-Standard.com