Which of the following attacks allows access to contact lists on cellular phones?
Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection. Bluetooth is a
high-speed but very short-range wireless technology for exchanging data between desktop and mobile
computers, personal digital assistants (PDAs), and other devices. By exploiting a vulnerability in the way
Bluetooth is implemented on a mobile phone, an attacker can access information — such as the user’s
calendar, contact list and e-mail and text messages — without leaving any evidence of the attack. Other devices
that use Bluetooth, such as laptop computers, may also be vulnerable, although to a lesser extent, by virtue of
their more complex systems. Operating in invisible mode protects some devices, but others are vulnerable as
long as Bluetooth is enabled.