Category: Articles

Articles on Bluejacking

Potential Threats to WAP phones

Features: This paper will review WAP, WAP Push, WML, and WMLScript and their ability to host malicious software. Exploits such as buffer overflows, authentication, and encryption schemes are outside the scope of this paper. Finally to detech such future threats,…