PhishingBox Logo
Banner

What You'll Learn Today:

How to Keep Your AirDrop & Bluetooth Secure

You should only turn these features on when actively using them.

Stay Secure

AirDrop Icon
  • AirDrop
    • Works by combining both Bluetooth and wireless connectivity
    • Only vulnerable when turned on and cannot be compromised while off
    • Allow access to "Contacts Only" to keep strangers and nearby hackers from penetrating your device via its AirDrop functionality
    • When not in use, switch to "Receiving Off" mode
    • Ensure your device has the latest updates installed so any known bugs are patched
    Bluetooth Icon
  • Bluetooth
    • An easy way to connect devices for sharing data, playing music, seeing photos, and more
    • Just like a Wi-Fi connection, Bluetooth can be exploited by hackers to gain control of your device, install malware, or passively view your transfer of information without you knowing
    • Cybercriminals can also track a Bluetooth user's device to determine physical location
    • Keep your Bluetooth off when you are not actively using it to pair to a device and never connect to unknown devices
    AirDrop Icon
  • AirDrop
    • Works by combining both Bluetooth and wireless connectivity
    • Only vulnerable when turned on and cannot be compromised while off
    • Allow access to "Contacts Only" to keep strangers and nearby hackers from penetrating your device via its AirDrop functionality
    • When not in use, switch to "Receiving Off" mode
    • Ensure your device has the latest updates installed so any known bugs are patched
    Bluetooth Icon
  • Bluetooth
    • An easy way to connect devices for sharing data, playing music, seeing photos, and more
    • Just like a Wi-Fi connection, Bluetooth can be exploited by hackers to gain control of your device, install malware, or passively view your transfer of information without you knowing
    • Cybercriminals can also track a Bluetooth user's device to determine physical location
    • Keep your Bluetooth off when you are not actively using it to pair to a device and never connect to unknown devices

    When you're done using either technology, TURN IT OFF!

    Copyright © PhishingBox