Articles

Articles on Bluejacking

Stealing Bluetooth Link Keys

Stealing Bluetooth Link Keys

Features: This document describes that there are 2 items required to attack a bluetooth pair The ability to spoof a BD_ADDR and possession of a secret key also known as a Link Key This document discusses the possibilities of obtaining such keys.

Read more »

Exploiting Open Functionality in SMS-Capable Cellular Network

Exploiting Open Functionality in SMS-Capable Cellular Network

Features: This is a PDF which describe in detail research which evaluates the security impact of the (SMS) interface on the availability of the cellular phone network. Specifically, it demonstrates the ability to deny voice service to large metropolitan areas with little more than a cable modem. Interesting Read

Read more »