Once the devices are discovered, they become exposed to threats such as bluesnarfing. |
|
Hackers can download confidential details and even photos from up to 87 yards away using a technique called Bluesnarfing. |
|
Shut down Bluetooth in public to guard against Bluejacking or Bluesnarfing. |
|
With Bluesnarfing, also called Bluejacking, hackers use a laptop which scans to find Bluetooth-compatible phones which can then be targeted. |
|
Digital and known for their work in OpensSSL and BlueSnarfing, join the newly formed company as Technical Director and Director of Security, respectively. |
|