Unauthorized Obtaining of Bluetooth-Enabled Devices Data
The article is dedicated to the attacks on Bluetooth devices. The described attacks allow a hacker to get information about the device. The attack could be implemented both when the Bluetooth receiver works in the hidden mode and when the receiver is in the active mode.
Gespeichert in:
Veröffentlicht in: | Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ 2012-09, Vol.19 (2S), p.47-49 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The article is dedicated to the attacks on Bluetooth devices. The described attacks allow a hacker to get information about the device. The attack could be implemented both when the Bluetooth receiver works in the hidden mode and when the receiver is in the active mode. |
---|---|
ISSN: | 2074-7128 2074-7136 |