The older Bluetooth attack known as ____________________, used weaknesses in the Bluetooth standard to steal information from other Bluetooth devices.
Fill in the blank(s) with the appropriate word(s).
Bluesnarfing
Computer Science & Information Technology