Bluetooth is a wireless protocol utilizing short-range communications technology facilitating data transmission over short distances from fixed and mobile devices, creating wireless personal area networks (PANs). . Bluetooth has several threats which range in level of risk and how widespread the action is.
Bluetooth attacks:
· Confidential data such as the entire phone book, calender and the phone's IMEI.
· Complete memory contents of some mobile phones can be accessed by a previously trusted ("paired") device that has since been removed from the trusted list.
· Access can be gained to the AT command set of the device, giving full access to the higher level commands and channels, such as data, voice and messaging.
Tuesday, July 14, 2009
Subscribe to:
Posts (Atom)