Avoid wireless attacks through your Bluetooth cell phone

Avoid wireless attacks through your Bluetooth cell phone


 


 


 


Avoid wireless attacks through your Bluetooth cell phone


Bluetooth wireless technology is included with many cell phones and PDAs. It was initially designed to let you swap documents between other Bluetooth devices without the use of annoying connecting cables, but has since expanded to provide services such as Web connectivity and online game playing. However, any time you transmit information online, you can be vulnerable to online attack; and as the popularity of Bluetooth increases, so does its interest to cybercriminals.


Get tips to help improve the security of your Bluetooth-enabled cell phone or PDA:


– The Bluetooth process and vulnerability
– Tips to improve your Bluetooth security
– More Bluetooth tidbits


Read the tips in Microsoft Security At Home

Leave a Reply