Friday, October 10, 2008

The Ease of Hacking into a Wireless Device

Cell phone protection from hackers is a subject that is commonly overlooked, but if people knew the truth and the ease hackers have in stealing your information, you would be quite interested in protecting your information.

Data theft is emerging as the number one crime in today’s society. Additionally, governments in efforts expose gambling rings, drug dealers, and other nefarious individuals are readily using this technology to hack mobile devices. Whatever the use of bluetooth and wireless technology information, privacy is no longer safe.

Prior to righting this article I did a google search on the term “how to hack into a mobile phone using bluetooth.” A very nice explanatory video appeared which readily instructed me on the process. In a manner of minutes, the reprehensible individual equipped with a mobile phone of his own can download free software that allows for this bluetooth hack. After downloading the necessary software the individual only need stand in a reasonably public location, search for other mobile devices, and begin reading message, stealing contacts, find bank numbers, passwords, ect.

Next time you find yourself in a reasonably crowded public area, do a bluetooth search on your phone. Multiple unprotected devices should appear.

In addition to bluetooth, hackers can easily tap into your wireless device using the data network, or the internet. Again, even to the uneducated hacker, videos and instruction are readily found on the internet. I highly discourage anyone from learning how to do this for illegal purposes, however, it is important to know this to avoid becoming a victim.

What are your options for avoiding this crime?

Easiest solution, do not convey confidential information over your phone or the internet. However, I realize in this day and age this is practically impossible.


Use an offshore data hosting solution. Jurisdiction under international policy allows for a much greater level of privacy.


Use some form of data encryption
Great illustration and photo by Ajda Gregorčič's


For more information on how you can protect your wireless devices go to:


No comments: