COMPUTER NETWORKING

WIRELESS NETWORKS AND MOBILE IP

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What is the unauthorized access of information from a wireless device through a Bluetooth connection called?
A
bluejacking
B
bluesnarfing
C
Bluetooth snatching
D
Bluetooth spoofing
Explanation: 

Detailed explanation-1: -Bluesnarfing is a hacking technique in which a hacker accesses a wireless device through a Bluetooth connection. It happens without the device user’s permission and often results in the theft of information or some other kind of damage to the device (and user).

Detailed explanation-2: -While Bluejacking presents unwanted content to a victim, Bluesnarfing takes content from the victim. These attacks manipulate Bluetooth connections to steal passwords, images, contacts or other data from your device. Bluesnarfing attacks can be hard to detect, too.

Detailed explanation-3: -Some bluesnarfing attackers use the victim’s phone to call long distance, leaving its owner with a huge telephone bill. All these happen without the victim’s knowledge, of course, and so attacks can go on for a long time.

Detailed explanation-4: -The process of linking the Bluetooth device from a far distance is called Bluesniping. Hackers use this to attack people’s gadgets that are not close to them. The tool can go beyond the Bluetooth range.

There is 1 question to complete.