What is Bluetooth?
Wireless technology for short-distance data exchange between fixed and mobile devices without needing an internet connection
What is Insecure pairing?
Occurs when Bluetooth devices establish a connection without proper authentication
What is Device Spoofing?
Occurs when an attacker impersonates a device to trick a user into connecting
What are On-path attacks?
Exploits Bluetooth protocol vulnerabilities to intercept and alter communications between devices without either party being aware
What is Bluejacking?
Sending unsolicited messages to a Bluetooth device
What is Bluesnarfing
Unauthorized access to a device to steal information like contacts, call logs, and text messages
What is Bluebugging?
Allows attackers to take control of a device’s Bluetooth functions
What is a Bluesmack?
Denial-of-service attack by overwhelming a device with data, causing it to crash or become unresponsive
What is Blueborne?
Spreads through the air to infect devices without user interaction