Unauthorized Data Theft from Bluetooth-Enabled Devices Using RFCOMMVulnerabilities
The article is dedicated to the attacks on Bluetooth devices. The described attacks allow hackers to steal private data from mobile devices. The attack is based on vulnerabilities found in RFCOMM-level of Bluetooth protocols stack. The described attack is even more dangerous because of the fact that...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Joint Stock Company "Experimental Scientific and Production Association SPELS
2012-09-01
|
Series: | Безопасность информационных технологий |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/455 |