Unauthorized Obtaining of Bluetooth-Enabled Devices Data

The article is dedicated to the attacks on Bluetooth devices. The described attacks allow a hacker to get information about the device. The attack could be implemented both when the Bluetooth receiver works in the hidden mode and when the receiver is in the active mode.

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ 2012-09, Vol.19 (2S), p.47-49
Hauptverfasser: A. D. Prohorov, D. S. Krymov, S. D. Mizun, A. A. Pikhtulov
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The article is dedicated to the attacks on Bluetooth devices. The described attacks allow a hacker to get information about the device. The attack could be implemented both when the Bluetooth receiver works in the hidden mode and when the receiver is in the active mode.
ISSN:2074-7128
2074-7136