From the course: ISC2 Systems Security Certified Practitioner (SSCP) (2024) Cert Prep

Unlock this course with a free trial

Join today to access over 24,500 courses taught by industry experts.

Understanding Bluetooth and NFC attacks

Understanding Bluetooth and NFC attacks

- [Narrator] Today's smartphones use near-field communication technology for a wide variety of purposes. This short range radio communication method allows the use of headsets, mobile payments, external speakers, keyboards and all sorts of other uses. As with any technology however, the use of NFC communications provides attackers with another pathway to exploit security vulnerabilities. NFC communications cover very short ranges. They're designed to handle situations where devices are 30 to 50 feet apart. Bluetooth is the most common NFC technology and most people are familiar with the use of Bluetooth to connect smartphones to car audio systems, external speakers and headsets. NFC communications are very useful but they can also be a source of security vulnerabilities. Bluejacking attacks occur when attackers use Bluetooth technology to send spam messages directly to a device. Typically, they try to convince the user to…

Contents