This study explored the Bluetooth vulnerabilities of mobile phones and how those vulnerabilities can be utilized by attackers to control mobile phones and gain personal data. The researcher conducted attacks on mobile phones under varying conditions in order to verify the efficacy of two attacks, Bluesnarfing and Bluebugging. This method tested improvements in Bluetooth security features by using attack verification. In other words, if an attack is designed to make use of the vulnerabilities of Bluetooth 1.0, then the newer version, Bluetooth 2.0, should have a proposed solution designed to fix these vulnerabilities. This study demonstrated that the security features of Bluetooth have been improved to defend against Bluesnarfing and Bluebug...
Abstract — Bluetooth is a popular way for mobile devices to connect wirelessly. Such a connection al...
This manuscript describes the analysis of the Bluetooth protocol for known and possible security fla...
The article is dedicated to the attacks on Bluetooth devices. The described attacks allow hackers to...
Bluetooth technology becomes a part of our daily lives. It is built into a many products such as mob...
Exponential growth of the volume of Bluetooth-enabled devices indicates that it has become a popular...
Exponential growth of the volume of Bluetooth-enabled devices indicates that it has become a popular...
Smartphone vendors have been increasingly integrating Bluetooth technology into their devices to inc...
Bluetooth plays a major role in expanding global spread of wireless technology. This predominantly h...
Bluetooth technology is very vulnerable, and there are many ways to use it for malicious activity on...
Thesis (M.Ing. (Computer and Electronical Engineering))--North-West University, Potchefstroom Campus...
Bluetooth is a de facto standard feature in mobile devices such as smart phones, PDAs and similar de...
Bluetooth technology is a key component of wireless communications. It provides a low-energy and low...
As the widespread use and acceptance of Bluetooth continues concerns are being raised related to sec...
This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled d...
Bluetooth technology is a de facto global standard for a short-range, low-power and low-cost form of...
Abstract — Bluetooth is a popular way for mobile devices to connect wirelessly. Such a connection al...
This manuscript describes the analysis of the Bluetooth protocol for known and possible security fla...
The article is dedicated to the attacks on Bluetooth devices. The described attacks allow hackers to...
Bluetooth technology becomes a part of our daily lives. It is built into a many products such as mob...
Exponential growth of the volume of Bluetooth-enabled devices indicates that it has become a popular...
Exponential growth of the volume of Bluetooth-enabled devices indicates that it has become a popular...
Smartphone vendors have been increasingly integrating Bluetooth technology into their devices to inc...
Bluetooth plays a major role in expanding global spread of wireless technology. This predominantly h...
Bluetooth technology is very vulnerable, and there are many ways to use it for malicious activity on...
Thesis (M.Ing. (Computer and Electronical Engineering))--North-West University, Potchefstroom Campus...
Bluetooth is a de facto standard feature in mobile devices such as smart phones, PDAs and similar de...
Bluetooth technology is a key component of wireless communications. It provides a low-energy and low...
As the widespread use and acceptance of Bluetooth continues concerns are being raised related to sec...
This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled d...
Bluetooth technology is a de facto global standard for a short-range, low-power and low-cost form of...
Abstract — Bluetooth is a popular way for mobile devices to connect wirelessly. Such a connection al...
This manuscript describes the analysis of the Bluetooth protocol for known and possible security fla...
The article is dedicated to the attacks on Bluetooth devices. The described attacks allow hackers to...