Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
Wireless security consultants Orthus carried the research at three mainline train stations in London, England and found that 49 percent of Bluetooth device owners were vulnerable to "Bluesnarfing" - having their calls hijacked or personal data such as photos, SMS messages or phonebook contacts stolen.
The survey also found that the majority of Bluetooth users that took their devices off "default" status gave them unusual names and invited other Bluetooth users to connect and chat. This activity (known as "Toothing") also opened up their devices to potential hacking. The survey also found hundreds of strangely named devices ranging from "Love Monkey" to "Call me Pickles".
An engineer armed with a laptop and a Linux-based security tool was able to identify hundreds of devices left unsecured as commuters tmade their way home through the stations.
The engineer also found that 379 out of 943 devices identified were still set to their default security settings and 138 of the 943 were vulnerable to hacking.
Martin Allen, managing director of mobile data security company Pointsec, said Bluesnarfing was a "silent threat which you wouldn't even know is happening to you."
"People keep a lot of confidential information on their PDAs and mobiles such as passwords, pin numbers, bank account details, customers names and addresses and within seconds this can be pulled by a hacker or competitor from right under their nose," he said.
He urged companies to to make sure that if staff have sensitive information on their mobile devices that "it is encrypted centrally and mandated within the security policy."
Earlier this month, SC Magazine reported on a mobile phone virus that can infect PCs.
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.