FUNDAMENTALS OF COMPUTER

TELECOMMUNICATIONS SYSTEMS

COMMUNICATION WIRELESS COMPUTING DEVICES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Unauthorised access of information from a wireless device through a bluetooth connection is called
A
bluemaking
B
bluesnarfing
C
bluestring
D
bluescoping
Explanation: 

Detailed explanation-1: -Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs (personal digital assistant).

Detailed explanation-2: -Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection.

Detailed explanation-3: -Some bluesnarfing attackers use the victim’s phone to call long distance, leaving its owner with a huge telephone bill. All these happen without the victim’s knowledge, of course, and so attacks can go on for a long time.

Detailed explanation-4: -Bluesnarfing is a Bluetooth® security threat in which a hacker gains unauthorized access to your files using a Bluetooth connection. Nowadays, nearly all devices use Bluetooth.

Detailed explanation-5: -Since smartphones these days come with built-in authentication, bluesnarfing attacks are on the decline. However, if you have a really old mobile with a Bluetooth feature, you should keep your mobile on non-discoverable/hidden mode for more security. Never accept Bluetooth pairing requests from unknown devices.

There is 1 question to complete.