English
wikipedia
Etymology
term|Bluetooth|Blue(tooth)|langen + term|snarf|snarfing|langen.
Noun
en-noun|-
- The theft of information from a wireless device through a Bluetooth connexion, often between phones, desktops, laptops, or PDAs.
#* 2005: Shinji Shimojo, Shingo Ichii, Tok Wang Ling, and Kwan-Ho Song, <i>Web and Communication Technologies and Internet-Related Social Issues � HSI 2005: 3<sup>rd</sup> International Conference on Human.Society@Internet � Tokyo, Japan, July 2005: Proceedings</i>, essay title: A Mobile Phone Malicious Software Detection Model with Behavior Checker , by Teck Sung Yap and Hong Tat Ewe, §1: �Introduction�, ¶���3, p58 (Springer; ISBN 3540278303 (10), ISBN 978-3540278306 (13))
#*: Bluejacking and bluesnarfing are the two forms of new intrusion. Bluejacking is a technique of sending anonymous messages to Bluetooth enabled device and bluesnarfing allows attackers to hack in and download data stored in mobile phones such as contact details and diary entries without leaving any trace [7].
#* 2006, <span style"font-variant:small-caps">December the 2<sup>nd</sup></span>: Eric Cole & Sandra Ring, Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft, chapter 12: �Wireless Security Project Plan�, p462 (Syngress; ISBN 1597491012 (10), ISBN 978-1597491013 (13))
#*: Stealing calendar and contact information via bluesnarfing requires both Bluetooth devices be on and available. The quickest and easiest way to avoid bluesnarfing (which requires about two to three minutes of continuous connection time) is to disable Bluetooth when not specifically in use.
#* 2007: James M. Byrne & Donald J. Rebovich <nowiki>[</nowiki>ed.s], The New Technology of Crime, Law and Social Control, pp29–30 (The Criminal Justice Press; ISBN 1881798739 (10), ISBN 978-1881798736 (13))
#*: �Bluesnarfing�, sometimes also called Bluejacking and Podslurping, is the exploitation of Bluetooth-enabled devices. <nowiki>[</nowiki>�<nowiki>]</nowiki> The most infamous instance of Bluesnarfing occurred in February 2005, when a Sidekick II mobile communication device owned by the celebrity Paris Hilton was compromised. Information contained on the device, including data and images, was stolen. Bluesnarfing occurs when an individual in relatively close proximity to the victim uses a Bluetooth-enabled device to remove data from a victim with another Bluetooth-enabled device.
Derived terms
bluesnarf
|