{"id":4227,"date":"2011-10-14T13:55:33","date_gmt":"2011-10-14T13:55:33","guid":{"rendered":"https:\/\/www.techopedia.com\/definition\/bluesnarfing\/"},"modified":"2013-02-26T16:56:56","modified_gmt":"2013-02-26T16:56:56","slug":"bluesnarfing","status":"publish","type":"definition","link":"https:\/\/www.techopedia.com\/definition\/5046\/bluesnarfing","title":{"rendered":"Bluesnarfing"},"content":{"rendered":"
Bluesnarfing is a device hack performed when a wireless, Bluetooth-enabled device is in discoverable mode. Bluesnarfing allows hackers to remotely access Bluetooth device data, such as a user’s calendar, contact list, emails and text messages. This attack is perpetrated without the victim’s knowledge.<\/p>\n
Bluetooth-enabled devices are vulnerable to bluesnarfing attacks when in discoverable mode because hackers can respond to queries from other Bluetooth-enabled devices, thus gaining unauthorized access to information. <\/p>\n
Most mobile phone discovery modes are activated by default. Unless the mode is deactivated, a device is susceptible to bluesnarfing attacks. The only way to fully protect a wireless device against bluesnarfing is to turn off Bluetooth. Keeping the phone in "invisible" mode provides some protection.<\/p>\n","protected":false},"excerpt":{"rendered":"
What Does Bluesnarfing Mean? Bluesnarfing is a device hack performed when a wireless, Bluetooth-enabled device is in discoverable mode. Bluesnarfing allows hackers to remotely access Bluetooth device data, such as a user’s calendar, contact list, emails and text messages. This attack is perpetrated without the victim’s knowledge. Techopedia Explains Bluesnarfing Bluetooth-enabled devices are vulnerable to […]<\/p>\n","protected":false},"author":7813,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"_acf_changed":false,"_lmt_disableupdate":"","_lmt_disable":"","om_disable_all_campaigns":false,"footnotes":""},"definitioncat":[238,218,227,250,236,220],"class_list":["post-4227","definition","type-definition","status-publish","format-standard","hentry","definitioncat-buzzwords-and-jargon","definitioncat-cybersecurity","definitioncat-data-management","definitioncat-information-assurance","definitioncat-network-management","definitioncat-wireless-and-mobile"],"acf":[],"yoast_head":"\n