Cell Phone Bluetooth Security
Put it in this way: if the cell phone is in visible mode, it will be discovered by the malicious hacker and then, after some "....", the hacker will be able to see address book or even place a bug into the phone so you have another big brother.
My question is, what is that "...."? How does the Bluetooth "gun" get into the symbian system? Similar question to the latest Windows Pocket PC trojan: how can they do that? Is it the same stuff as hacking into a desktop computer system?
My question is, what is that "...."? How does the Bluetooth "gun" get into the symbian system? Similar question to the latest Windows Pocket PC trojan: how can they do that? Is it the same stuff as hacking into a desktop computer system?
3 Comments:
Update:
Here is the link to some description of the attack. It looks like a stack overflow.
Put another way: not all Bluetooth phones are vulnerable to this. This is important b/c the problem is not with the Bluetooth but with certain manufacturers.
Great blog!
I really enjoyed looking over your last post. Pet peeve #1 - People with a cellphone plastered to their ear while trying to drive. Don't they realize all they have to do is go to www.bluetoothbargains.combluetooth wireless get a bluetooth wireless and make driving alot easier for all of us. Soon laws will require it! Well, keep the great posts coming and I'll be back to check it out.
Post a Comment
<< Home