Sigillu

Secure Communications

Symantec warns users over Bluetooth security

A third threat, and possibly the most serious of the three risks, is bluebugging. This technique allows attackers to access mobile-phone commands using Bluetooth technology, without notifying or alerting the device owner, Ooi noted.

“This vulnerability allows the hacker to initiate phone calls, send and receive text messages, read and write phonebook contacts, eavesdrop on phone conversations and connect to the Internet,” Ooi explained. “As with all the attacks, the hacker must be within a 10-meter range of the (targeted) phone.”

Unlike bluesnarfing, which simply provides attackers access to personal information on the phone, bluebugging allows the attacker to take control of the device, he said.

Link to article

Sigillu_Logo

Advertisements

September 21, 2007 - Posted by | bugging devices, cellular phone, English, mobile, security, technology, text message

No comments yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: