Which of the following Bluetooth hacking techniques does an attacker use to send messages to users without the recipient's consent, similar to email spamming?
Bluetooth Hacking - Bluejacking
Bluejacking is the use of Bluetooth to send messages to users without the recipient's consent, similar to email spamming. Prior to any Bluetooth communication, the device initiating the connection must provide a name that is displayed on the recipient's screen. Sending anonymous messages over Bluetooth to Bluetooth-enabled devices, via the OBEX(Object Exchange) protocol. (P.2344/2328)
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Daniel8660
8 months, 3 weeks agocesarai
1 year agoScryptic
1 year, 9 months ago