You Can No Longer Neglect Bluetooth Security
More than 4 billion Bluetooth enabled devices will ship in 2016, and the protocol is only becoming more common and is incorporated into increasingly more sensitive systems.
89% of security professionals have no visibility into Bluetooth devices
What's at risk?
Bluetooth isn't just about fitness trackers anymore. It is the protocol of personal area networking, and shows up in:
- Medical Devices
- Speakers and headphones
It's not just the devices with Bluetooth that are at risk: Bluetooth-enabled security products put everything at risk, and medical devices and cars with Bluetooth vulnerabilities could prove fatal. Older versions of the protocol can put the entire network at risk, giving up passwords, usernames, confidential information, and more. Just because a protocol is relatively secure, that does not mean that the devices built for it are secure.
Why do I care?
Bluetooth enabled devices are everywhere in the enterprise, and nobody cares. But with the amount of information that can be accessed from Bluetooth-enabled headsets to Bluetooth locks that can be hacked, security professionals can no longer afford to ignore Bluetooth enabled devices.
What can I do about it?
With Pwnie's innovative Blue Hydra software, all Bluetooth devices (both standard and low energy) are detected and tagged immediately within the Pulse console.
Bluetooth Low Energy is driving the growth of the Internet of Things
Bluetooth Low Energy’s low power usage and the worldwide presence of Bluetooth give it a major edge over other technologies, many of which require new controllers or adaptations to new standards.
BLE is an industry-standard protocol that can be operated with different vendors and devices. Application development is easier and cheaper, as vendors and developers have existing familiarity. Because it consumes much less power than the average Bluetooth or Wi-Fi device, it can run - or hibernate - for months or even years on tiny coin-cell batteries.