Protect against Bluetooth threats | ZDNet. Wearable computing depends on bluetooth, a form of wireless data transfer that works between devices within 30 feet away. That is how my SmartWatches and my SmartPhone and my Bluetooth Headset communicate. Since you have to be in range of the device to hack it, this form of exploit is not as dangerous as traditional Internet exploits. However, you speak a lot of sensitive stuff on your phone, watch and so forth, so it pays to be careful. There is an increase in bluejacking, bluesnarfing and bluebugging attacks as mobile and wearable devices have proliferated. However, there are things you can do to protect yourself. Number one on my list is to make sure you aren't broadcasting your device name. This is simple to turn off, and makes you invisible. Newer devices have more built in protection against these exploits, and most now give you a heads up before they connect to another device. Just say no. Risk is a part of life in the data age. Be careful out there.