Unauthorized access to mobile device data through a Bluetooth connection. Bluesnarfing attacks appeared in the early stages of developing data transfer technology and involved connecting to a third-party phone or tablet without the device owner’s permission. It enabled an attacker to secretly copy calendars, address books, images, and other personal information. In most modern operating systems and client programs, pairing two nodes via Bluetooth has to be confirmed on both sides, so Bluesnarfing attacks are now extremely rare.

Related Posts