G
Guest
Guest
Archived from groups: alt.cellular.attws,alt.cellular.cingular,alt.cellular.gsm,alt.cellular.gsm.carriers.voicestream (More info?)
<http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci952393,00.html>
Bluesnarfing is the theft of information from a wireless device
through a Bluetooth connection. Bluetooth is a high-speed but very
short-range wireless technology for exchanging data between desktop
and mobile computers, personal digital assistants (PDAs), and other
devices. By exploiting a vulnerability in the way Bluetooth is
implemented on a mobile phone, an attacker can access information --
such as the user's calendar, contact list and e-mail and text
messages -- without leaving any evidence of the attack. Other devices
that use Bluetooth, such as laptop computers, may also be vulnerable,
although to a lesser extent, by virtue of their more complex systems.
Operating in invisible mode protects some devices, but others are
vulnerable as long as Bluetooth is enabled.
[MORE]
For information, see <http://www.thebunker.net/security/bluetooth.htm>
See also <http://www.giac.org/practical/GCIA/Scott_Renna_GCIA.pdf>, which
describes attack on a Sony Ericsson T610.
--
Best regards, HELP FOR CINGULAR GSM & SONY ERICSSON PHONES:
John Navas <http://navasgrp.home.att.net/#Cingular>
<http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci952393,00.html>
Bluesnarfing is the theft of information from a wireless device
through a Bluetooth connection. Bluetooth is a high-speed but very
short-range wireless technology for exchanging data between desktop
and mobile computers, personal digital assistants (PDAs), and other
devices. By exploiting a vulnerability in the way Bluetooth is
implemented on a mobile phone, an attacker can access information --
such as the user's calendar, contact list and e-mail and text
messages -- without leaving any evidence of the attack. Other devices
that use Bluetooth, such as laptop computers, may also be vulnerable,
although to a lesser extent, by virtue of their more complex systems.
Operating in invisible mode protects some devices, but others are
vulnerable as long as Bluetooth is enabled.
[MORE]
For information, see <http://www.thebunker.net/security/bluetooth.htm>
See also <http://www.giac.org/practical/GCIA/Scott_Renna_GCIA.pdf>, which
describes attack on a Sony Ericsson T610.
--
Best regards, HELP FOR CINGULAR GSM & SONY ERICSSON PHONES:
John Navas <http://navasgrp.home.att.net/#Cingular>