The older Bluetooth attack known as ____________________, used weaknesses in the Bluetooth standard to steal information from other Bluetooth devices.

Fill in the blank(s) with the appropriate word(s).

Bluesnarfing

Computer Science & Information Technology

You might also like to view...

What type of connection do they use (T1–T3 Frame Relay, and so forth)?

What will be an ideal response?

Computer Science & Information Technology

Which of the following is not a possessed object?

A. PIN B. badge C. smart card D. key

Computer Science & Information Technology