Part 1:
http://www.securityfocus.com/infocus/1830
Citat:Introduction to Bluetooth
Bluetooth (BT) wireless technology provides an easy way for a wide range of devices to communicate with each other and connect to the Internet without the need for wires, cables and connectors. It is supported and used in products by over 3000 companies, including large corporations such as Sony Ericsson, Nokia, Motorola, Intel, IBM, Toshiba, Motorola, Apple, Microsoft, and even Toyota, Lexus and BMW. A variety of products available on the market have short range Bluetooth radios installed, including printers, laptops, keyboards, cars and the most popular type of Bluetooth enabled devices - mobile phones, driving 60% of the Bluetooth market. The technology has already gained enormous popularity, with more than 3 million Bluetooth-enabled products shipping every week. According to IDC, there will be over 922 million Bluetooth enabled devices worldwide by 2008. The technology seams to be very interesting and beneficial, yet it can also be a high threat for the privacy and security of Bluetooth users.
Part 2:
http://securityfocus.com/infocus/1834
Citat:Bluetooth fauna
When the Cabir mobile worm started to attack mobile devices and used Bluetooth to spread, many people were caught by surprise. It first appeared as a proof-of-concept virus written by the A29 group, was provided to an anti-virus company, and then later appeared in the wild. The worm started spreading from infected mobile phones using the Bluetooth wireless capabilities to search for the next victim and infect it based. This infection was based on a vulnerability in the Bluetooth implementation of several Nokia and Sony Ericsson phones. The virus was not dangerous, however, as it only drained the phone's battery and it still required the user to accept installation of the file. However, it showed that it is possible to write mobiles viruses that spread via Bluetooth, which may encourage a number of virus writers to take the same approach. Future Bluetooth viruses may very well be much more damaging. A good example of the potential damage that can be caused first appeared in Japan in 2001, where the virus blocked the ability to call emergency numbers. Recent vulnerabilities in Java, discovered by famous Polish security researcher Adam Gowdiak, could also be used by mobile virus writers to break the Java mobile security model and get access to the phone's memory, affecting many things including changing the very way the phone works.
|