Skip to content

KINGSANIT CYBERPEDIA

Menu
  • Cyber Security
    • Cyber Security Fundamentals
      • Security Principles
      • Information Security
    • Hacking
      • Reconnaissance
        • Footprinting
        • Scanning
        • Enumeration
        • Vulnerability Analysis
      • Privilege Escalation
      • Ethical Hacking
    • Governance, Risk And Compliance (GRC)
      • Risk Management
    • Security Architecture And Engineering
      • Cryptography
      • Identity Access Management
    • Security Operations
      • Security Assessment
        • Vulnerability Management
          • Threat Intelligence
      • Intrusion Detection And Prevention
    • Cyber Security Attacks and Threats
      • DoS
      • Password Hacking
      • Web Attacks
      • Web Applications Attacks
      • WI-FI Wireless Attacks
      • Bluetooth Attacks
  • Computer Networks And Internet
    • LAN Switching
    • Networking Protocols
    • Internet
  • Information Technology
    • Database
    • Web
  • Computer Architecture And Organization
  • Operating Systems
    • Programming
Menu

Bluetooth Attacks

Posted on by

Bluetooth is a short range wireless technology based on IEEE 802.15.1 that uses radio waves for data and voice communication. Bluetooth is used for Personal Area Network (PAN) for connecting personal devices on wireless. As bluetooth is communicated in an open space it’s susceptible for attacks. The following are various bluetooth attacks:

Bluejacking – Unsolicited messages are sent using bluetooth.

Bluesnarfing – Un-authorised access of data through bluetooth.

Bluebugging – Exploit devices using bluetooth and take control of it.

Blueborne – Exploiting specific bluetooth devices and take complete control or access data.

Recent Posts

  • Cloud Attacks
  • Serverless Computing
  • Virtualization
  • Hypervisor
  • Containers
© 2026 KINGSANIT CYBERPEDIA | Powered by Minimalist Blog WordPress Theme