Solved

Blue Snarfing

Posted on 2004-05-03
1
868 Views
Last Modified: 2013-12-04
What is blue snarfing??
0
Comment
Question by:rodard
1 Comment
 
LVL 2

Accepted Solution

by:
edward301 earned 205 total points
ID: 10976390
A PDA and a phone can talk to each other through a Bluetooth connection. This means I can copy the data from one to the other, or I can go online on the PDA, using the phone to connect to the web.

To stop me accessing someone else's phone without their permission, I have to enter the same code numbers on both devices. This proves that they're both in my possession. So that's all secure and sorted... or at least it should be.
Adam Laurie is a security expert who can hack into certain models of phones without an access code. Using a Bluetooth enabled laptop and specially written software, he can take your data at the push of a button, an attack he's dubbed 'Bluesnarfing'.


http://www.bbcworld.com/content/clickonline_archive_15_2004.asp?pageid=666&co_pageid=3


Edward301 :)
0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In today's information driven age, entrepreneurs have so many great tools and options at their disposal to help turn good ideas into a thriving business. With cloud-based online services, such as Amazon's Web Services (AWS) or Microsoft's Azure, bus…
Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

680 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question