You are here: Home / Mobile Security / Mitigation against Mobile Connectivity Security Attacks

Mitigation against Mobile Connectivity Security Attacks

Mitigation against Mobile Connectivity Security Attacks


Bluetooth is a wireless technology that allows different devices to connect to one another and share data, such as ringtones or photos. Wireless signals transmitted with Bluetooth cover short distanes, typically 30 feet (10 meters).


  1. Use Bluetooth in hidden mode so that even if the device is using Bluetooth it is not visible to oth- ers.

  2. Change the name of the device to a different name to avoid recognition ofyour Mobile phone model.

Note: The default name will be the mobile model number for Bluetooth devices.

  • Put a password while pairing with other devices. The devices with the same password can connect to your computer

  • Disable Bluetooth when it is not actively transmitting information.

  • Use Bluetooth with temporary time limit after which it automatically disables so that the device is not available continuously for others.


  1. Never allow unknown devices to connect through Bluetooth.

  2. Never switch on Bluetooth continuously.

  3. Never put Bluetooth in always discoverable mode.

Note: Attackers can take advantage of its default always-on, always discoverable settings to launch attacks.

Wi-Fi :

Wi-Fi is short for “Wireless Fidelity.” Wi-Fi refers to wireless networking technology that allows computers and other devices to communicate over a wireless signal.

Many mobile devices, video game systems, and other standalone devices also include Wi-Fi capability, enabling them to connect to wireless networks. These devices may be able to connect to the Internet using Wi-Fi.


  • Connect only to the trusted networks.

  • Use Wi-Fi only when required. It is advisable to switch off the service when not in use.

  • Beware while connecting to public networks, as they may not be secure.


  • Never connect to unknown networks or untrusted networks.

Animated Videos

Download Brochures

Related Links
Incident Reporting

To report cyber incident, please visit,

This is Schools Diazo Plone Theme