- Berghel, H. Phishing Mongers and Posers. Commun. of the ACM, 49, 4, (2006). Google ScholarDigital Library
- Bialoalowv, M. Bluetooth Security Review, Security Focus, 2005; (www.securityfocus.com/infocus/1830).Google Scholar
- Bluetooth SIG, Bluetooth SIG Improves User Experience, March 2007. (http://www.bluetooth.com/Bluetooth/Press/SIG/BLUETOOTH_SIG_IMPROVES_USER_EXPERIENCE.htm)Google Scholar
- Laurie, B. and Laurie, A. Serious flaws in bluetooth security lead to disclosure of personal data. L. A. Digital Ltd., 2004; (http://www.thebunker.net/security/bluetooth.htm).Google Scholar
- McMillan, R. BlueBag PC Sniffs Out Bluetooth Flaws. IDG News Services, 2006.Google Scholar
- Shaked, Y. and Wool, A. Cracking the Bluetooth PIN. Proceedings of 3rd USENIX/ACM Conference on Mobile Systems, Applications and Services, 2005, 39--50. Google ScholarDigital Library
- Zetter, Kim. Security cavities ail Bluetooth. Wired News, 2004. (http://www.wired.com/news/privacy/1,64463-0.html)Google Scholar
Index Terms
- Technical opinion
Security threats of smart phones and Bluetooth
Recommendations
Issues with Various Security Threats on Mobile Phones
PICICT '13: Proceedings of the 2013 Palestinian International Conference on Information and Communication TechnologyThe number of Mobile phones, mainly smart phones, being sold has increased dramatically in recent years. They are becoming more preferred companions to users than desktops or notebooks. This has led to more and more sensitive data being stored on these ...
Security threats in Bluetooth technology
Bluetooth allows connecting mobile devices in short range in order to transfer files/videos. It is now a popular means of short range wireless communication. Although Bluetooth is acceptably reliable, there are still some weaknesses in this protocol. ...
Injecting SMS messages into smart phones for security analysis
WOOT'09: Proceedings of the 3rd USENIX conference on Offensive technologiesThe Short Message Service (SMS) is one of the building blocks of the mobile phone service. It is used for text messaging by users as well as for services that work under the hood of every mobile phone. The security of SMS-implementations is critical ...
Comments