From the course: CompTIA Security+ (SY0-601) Cert Prep: 8 Network Security Design and Implementation

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Understanding Bluetooth and NFC attacks

Understanding Bluetooth and NFC attacks

From the course: CompTIA Security+ (SY0-601) Cert Prep: 8 Network Security Design and Implementation

Start my 1-month free trial

Understanding Bluetooth and NFC attacks

- [Instructor] Today's smartphones use near-field communication technology for a wide variety of purposes. This short-range radio communication method allows the use of headsets, mobile payments, external speakers, keyboards, and all sorts of other uses. As with any technology however, the use of NFC communications provides attackers with another pathway to exploit security vulnerabilities. NFC communications cover very short ranges. They're designed to handle situations where devices are 30 to 50 feet apart. And Bluetooth is the most common NFC technology. And most people are familiar with the use of Bluetooth to connect smartphones to car audio systems, external speakers, and headsets. NFC communications are very useful but they can also be a source of security vulnerabilities. Bluejacking attacks occur when attackers use Bluetooth technology to send spam messages directly to a device. Typically they try to convince the…

Contents