Bluebugging and Bluetoothing
by satheeshkumar[ Edit ] 2012-09-20 10:54:10
Bluebugging and Bluetoothing ,
Bluebugging :
The hacker uses sophisticated attacks to gain control of victims mobile. It works just like Trojan horses, where the hacker can manipulate the users phone the way he desires by executing commands on the victims phone. The hacker could forward mobile calls from the victim’s mobile to his own device and can even manipulate the mobile to follow a Bluetooth headset instructions like; receive call, send messages etc.
Bluetoothing :
The final type is Bluetoothing which is just like social engineering; the hacker can use methods like harassment or luring the victim to fall his prey to his intentions.