Solved

Blue Snarfing

Posted on 2004-05-03
1
867 Views
Last Modified: 2013-12-04
What is blue snarfing??
0
Comment
Question by:rodard
1 Comment
 
LVL 2

Accepted Solution

by:
edward301 earned 205 total points
ID: 10976390
A PDA and a phone can talk to each other through a Bluetooth connection. This means I can copy the data from one to the other, or I can go online on the PDA, using the phone to connect to the web.

To stop me accessing someone else's phone without their permission, I have to enter the same code numbers on both devices. This proves that they're both in my possession. So that's all secure and sorted... or at least it should be.
Adam Laurie is a security expert who can hack into certain models of phones without an access code. Using a Bluetooth enabled laptop and specially written software, he can take your data at the push of a button, an attack he's dubbed 'Bluesnarfing'.


http://www.bbcworld.com/content/clickonline_archive_15_2004.asp?pageid=666&co_pageid=3


Edward301 :)
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question