Bluesnarfing allows hackers to gain access to data stored on a Bluetooth enabled phone using Bluetooth wireless technology without alerting the phone’s user of the connection made to the device. The information that can be accessed in this manner includes the phonebook and associated images, calendar, and IMEI (International Mobile Equipment Identity). By setting the device in non-discoverable, it becomes significantly more difficult to find and attack the device. Without specialized equipment the hacker must be within a 10 meter range of the device while running a device with specialized software. Only specific older Bluetooth enabled phones are susceptible to bluesnarfing. [Source: Bluetooth wireless technology Hacking Information]
Bluesnarfing
Updated on:

Vangie Beal
Vangie Beal is a freelance business and technology writer covering Internet technologies and online business since the late '90s.
Related Articles
@ Sign
Pronounced at sign or simply as at, this symbol is used in e-mail addressing to separate the user' name from the user's domain name,...
Munging
(MUHN-jing) Munging (address munging), is the act of altering an email address posted on a Web page to make it unreadable to bots and...
How to Create an RSS Feed
In the second installment of RSS how-to, we look at some of the nonrequired (optional) channel and item tags, discuss RSS specifications in-depth and...
Dictionary Attack
(n.) (1) A method used to break security systems, specifically password-based security systems, in which the attacker systematically tests all possible passwords beginning with...
Definitions
ScalaHosting
ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...
Development
HRIS
Human resources information system (HRIS) solutions help businesses manage multiple facets of their...
Definitions
Best Managed Service Providers...
In today's business world, managed services are more critical than ever. They can...