Got Bluetooth? Your Personal Information Could Be at Risk

If you have an Android smartphone or tablet, you need to check your current security patch. This is especially important if you are currently using Android 8 (Oreo) or Android 9 (Pie). These are the more vulnerable versions of Android that can be hacked via Bluetooth.

If you are a user of Android 10 you need not fret, this doesn’t concern you.

The hackers in question are using the Bluetooth capabilities on these smart devices to insert malware and collect your personal data and information.

If you are a user who has the versions of Android that are most vulnerable, you need to check to see what your most recent security patches are. The dates you need to look for are 2020-02-01 and 2020-02-05. If you have one or both patches, congratulations, you are safe.

If you do not, you need to use extreme caution when you are using your Bluetooth on your phone.

Bluetooth is a type of wireless communication that allows electronic devices to connect and communicate with each other. A lot of headphones, speakers, and other gadgets utilize this technology.

The vulnerability has been named CVE-2020-0022. This vulnerability allows the hacker to exploit your Bluetooth and execute the necessary codes to infiltrate the Android 8 or 9 versions.

Unfortunately, it is not possible for a manual install of the security patches. You must wait for your device manufacturer to send out a system update. At that time, your security patches should be updated.

If you have not received this security patch yet, it is recommended that you only use your smart device’s Bluetooth capabilities when it is unavoidable.

It is also recommended that if you have to use your Bluetooth, keep your device undiscoverable. This hides your device from other outside parties. If they can’t find you, they can’t hack you.

It is important to keep in mind that Bluetooth doesn’t require Wi-Fi to work. The devices simply have to be within close proximity to each other. This is another reason why being undiscoverable is important.

CloudWedge