This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages)
This article needs to be updated. Please help update this to reflect recent events or newly available information.(September 2019)
This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. Find sources: "Bluesnarfing" – news · newspapers · books · scholar · JSTOR(May 2014) (Learn how and when to remove this message)
(Learn how and when to remove this message)
Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs (personal digital assistant).[1] This allows access to calendars, contact lists, emails and text messages, and on some phones, users can copy pictures and private videos. Both Bluesnarfing and Bluejacking exploit others' Bluetooth connections without their knowledge. While Bluejacking is essentially harmless as it only transmits data to the target device, Bluesnarfing is the theft of information from the target device.[2]
For a Bluesnarfing attack to succeed, the attacker generally needs to be within a minimum range of 10 meters from the target device. In some cases, though, attackers can initiate a Bluesnarfing attack from a greater distance.[3]
^Dagon, D.; Martin, T.; Starner, T. (2004-01-01). "Mobile Phones as Computing Devices: The Viruses are Coming!". IEEE Pervasive Computing. 3 (4): 11–15. doi:10.1109/MPRV.2004.21. ISSN 1536-1268. S2CID 14224399.
^Okazaki, Shintaro; Navarro-Bailón, María Ángeles; Molina-Castillo, Francisco-Jose (2012). "Privacy Concerns in Quick Response Code Mobile Promotion: The Role of Social Anxiety and Situational Involvement". International Journal of Electronic Commerce. 16 (4): 91–119. doi:10.2753/JEC1086-4415160404. hdl:10486/669231. ISSN 1086-4415. JSTOR 41739750. S2CID 33349618.
^Cite error: The named reference :0 was invoked but never defined (see the help page).
transmits data to the target device, Bluesnarfing is the theft of information from the target device. For a Bluesnarfing attack to succeed, the attacker generally...
awareness. It was developed after the onset of bluejacking and bluesnarfing. Similar to bluesnarfing, bluebugging accesses and uses all phone features but is...
especially on less powerful devices. Bluejacking is also confused with Bluesnarfing, which is the way in which mobile phones are illegally hacked via Bluetooth...
phone user into downloading malware that monitors activity on the phone. Bluesnarfing is an unauthorized access to a phone via Bluetooth. There are flaws in...
Archived from the original on 20 May 2015. Retrieved 26 May 2015. "Bluesnarfing vs. Bluejacking: Top 4 Differences". Spiceworks. Retrieved 6 March 2024...
commercial solutions which deposit a lockable plug into the port. Data theft Bluesnarfing Sneakernet Anderson, Brian; Anderson, Barbara (2010), "USB-Based Virus/Malicious...
drive artifacts), and other computer forensics techniques. Pod slurping Bluesnarfing Sneakernet Data breach Ian (2021-11-06). "The Data Theft You Never Hear...
can be operated by the user only - no software can connect it back. Bluesnarfing Carpenter v. United States Carrier IQ Cellphone jammer Cyber stalking...
nevertheless give up their hotspot credentials when asked for them Bluejacking Bluesnarfing Pod slurping "snarf". catb.org. Retrieved 2020-11-08. Potter, Bruce G...
with Bluetooth connectivity, however while making them susceptible to bluesnarfing. Some hardware devices (eg some Google Nexus smartphones) have in addition...