Cybersecurity researchers have uncovered a particular new technique used by malicious actors calledBluetooth Impersonation AttackS, literally: Bluetooth attack by imitation. The principle is simple; an unknown device pretends to be an accessory to which you have already connected before via this wireless network, takes the opportunity to connect to your smartphone or your computer, and thus send or receive sensitive data.
Many product modelsApplewould be affected, starting withall cell phones from iPhone 8, all iPads marketed since 2018 or even MacBooks three years old or less. As for the sources, these are for example keyboards of the same ilk asthe latest Logitech similar to the Magic Keyboardor montages from a Raspberry Pi.
How to protect yourself?
Apple would not be the only manufacturer victim of this strategy: articlesIntel, Samsung or even Qualcomm could also be affected in the event of exposure. Fortunately, there is a quick and effective solution to avoid being affected if you are a customer of one of these brands.
Simply turn off Bluetoothas long as you do not request it. Not only will potential hackers not be able to contact you via this means, but you will also save autonomy.
i-nfo.fr - Official iPhon.fr app
By : Keleops AG