Click here

bluebugging

Bluebugging allows skilled individuals to access the mobile phone commands using Bluetooth wireless technology without notifying or alerting the phone's user. This vulnerability allows the hacker to initiate phone calls, send and read SMS, read and write phonebook contacts, eavesdrop on phone conversations, and connect to the Internet. As with all the attacks, the hacker must be within a 10 meter range of the phone. This is a separate vulnerability from bluesnarfing and does not affect all of the same phones as bluesnarfing. *

* [Source: Bluetooth wireless technology Hacking Information]



Top Terms
  • 1

    private cloud project

    Companies initiate private cloud projects to enable their IT infrastructure to become more capable of quickly adapting to continually evolving...

    Read more »

  • 2

    cloud backup

    A cloud backup (cloud computer backup) refers to backing up data to a remote, cloud-based server. As a form of cloud storage, cloud backup data is...

    Read more »

  • Click Here!

Connect with Webopedia

  • Android Apps for Remote Computer Access

    Remote access is useful when you need to collaborate with co-workers, help a friend with PC problems or grab files from your desktop.

    Read More »

Did You Know? Archive »

  • Quick Reference Archive »