Which of the following Bluetooth hacking techniques does an attacker use to send messages to users without the recipient's consent, similar to email spamming?
Bluetooth Attacks
Bluesmacking - denial of service against device
Bluejacking - sending unsolicited messages
Bluesniffing - attempt to discover Bluetooth devices
Bluebugging - remotely using a device's features
Bluesnarfing - theft of data from a device
Blueprinting - collecting device information over Bluetooth
Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e., for bluedating or bluechat) to another Bluetooth-enabled device via the OBEX protocol.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
tinex
Highly Voted 8 months agoJKCY
Most Recent 8 months, 1 week agonsamuel204
1 year, 3 months ago