Tuesday, July 14, 2009

Blue tooth malware

Bluetooth is a wireless protocol utilizing short-range communications technology facilitating data transmission over short distances from fixed and mobile devices, creating wireless personal area networks (PANs). . Bluetooth has several threats which range in level of risk and how widespread the action is.
Bluetooth attacks:
· Confidential data such as the entire phone book, calender and the phone's IMEI.
· Complete memory contents of some mobile phones can be accessed by a previously trusted ("paired") device that has since been removed from the trusted list.
· Access can be gained to the AT command set of the device, giving full access to the higher level commands and channels, such as data, voice and messaging.