Skip to Main

Bluebugging

woman's hand holding smartphone with bluetooth logo on screen

Bluebugging occurs when a hacker exploits a vulnerability or weakness in a Bluetooth connection. They accomplish this through tools and software that can detect Bluetooth devices in proximity with vulnerable connections. Once a hacker makes this connection, they can then gain control of your phone without your knowledge. With so much personal and financial information stored on our mobile devices, our smartphones are just as vulnerable to cyberattacks as our computers and laptops.

Protect yourself from bluebugging:

  • Turn off Discovery Mode
  • Keep your devices updated
  • Remove older unused devices that are no longer used
  • Don’t connect to devices you’re not familiar with
  • Avoid public Wi-Fi networks

Bluetooth is one of the most popular ways to connect between devices wirelessly. Take caution when you’re out in public to keep your devices safe.


Questions about information security?

Office of Information Security
214-648-7600

informationsecurity@UTSouthwestern.edu