?
Solved

Blue Snarfing

Posted on 2004-05-03
1
Medium Priority
?
877 Views
Last Modified: 2013-12-04
What is blue snarfing??
0
Comment
Question by:rodard
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 2

Accepted Solution

by:
edward301 earned 820 total points
ID: 10976390
A PDA and a phone can talk to each other through a Bluetooth connection. This means I can copy the data from one to the other, or I can go online on the PDA, using the phone to connect to the web.

To stop me accessing someone else's phone without their permission, I have to enter the same code numbers on both devices. This proves that they're both in my possession. So that's all secure and sorted... or at least it should be.
Adam Laurie is a security expert who can hack into certain models of phones without an access code. Using a Bluetooth enabled laptop and specially written software, he can take your data at the push of a button, an attack he's dubbed 'Bluesnarfing'.


http://www.bbcworld.com/content/clickonline_archive_15_2004.asp?pageid=666&co_pageid=3


Edward301 :)
0

Featured Post

Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In a recent article here at Experts Exchange (http://www.experts-exchange.com/articles/18880/PaperPort-14-in-Windows-10-A-First-Look.html), I discussed my nine-month sandbox testing of the Windows 10 Technical Preview, specifically with respect to r…
Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
Visualize your data even better in Access queries. Given a date and a value, this lesson shows how to compare that value with the previous value, calculate the difference, and display a circle if the value is the same, an up triangle if it increased…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

718 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question