Tham khảo tài liệu 'ethical hacking and countermeasures - phần 37', công nghệ thông tin, an ninh - bảo mật phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả | M c EH Certified Ethical Hacker Ethical Hacking and Countermeasures Version 6 Module XXXVII Bluetooth Hacking IM c E H News Certified Ethical Hacker Bluetooth devices easily hacked Oct 23 2007 01 31 PM Cape Town - Bluetooth-enabled devices are vulnerable to unscrupulous hackers an expert warns. I Bluetooth was invented to connect devices such as cellphones laptops PCs printers digital cameras and video game consoles over a short-range radio frequency but like any computer network using Bluetooth can leave you vulnerable. Bluetooth hacking techniques vary tremendously. There are various attacks that have proved to be very effective over the last few years. Some of these attacks include making unauthorised calls and transactions reading and sending SMSs on a target phone erasing information and downloading personal information such as phone books and access codes says ICT security expert Dino Covotsos. Covotsos is MD of Telspace a Johannesburg-based company specialising in managed security services. Telspace routinely makes use of Bluetooth vulnerabilities to test the security level of its corporate clients networks. From our case studies and actual attack and penetration tests we have often utilised specific Bluetooth attacks to gain further entrance into a network Covotsos says. Source http Copyright by Ec-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited TM c EH Module Objective Certified Ethical Hacker This module will familiarize you with Bluetooth Security Issues in Bluetooth Attacks in Bluetooth Bluetooth Hacking Tools Viruses and Worms Bluetooth Security Tools EC-Council Copyright by Ec-Council All Rights Reserved. Reproduction is Strictly .