Dwntwnslim
Former Member
- Joined
- Oct 5, 2010
- Messages
- 907
- Reaction score
- 22
Pursuit Magazine
Internet & Cyber Crime Terms and Definitions
by Admin
http://pursuitmag.com/cyber-crime-terms-and-definitions/
*This website has a good glossary of Cyber terms. I will use some of those terms in my future posts. Pay particular attention to the following words:
Bluebugging: a form of bluetooth attack. A Bluebug program allows the user to take control of the victims phone. Not only can they make calls, they can send messages, essentially do anything the phone can do. This also means that the Bluebug user can simply listen to any conversation his victim is having in real life.
Bluejacking: the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers,
Bluesnarfing: the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs. This allows access to a calendar, contact list, emails and text messages, and on some phones users can steal pictures and private videos.
Internet & Cyber Crime Terms and Definitions
by Admin
http://pursuitmag.com/cyber-crime-terms-and-definitions/
*This website has a good glossary of Cyber terms. I will use some of those terms in my future posts. Pay particular attention to the following words:
Bluebugging: a form of bluetooth attack. A Bluebug program allows the user to take control of the victims phone. Not only can they make calls, they can send messages, essentially do anything the phone can do. This also means that the Bluebug user can simply listen to any conversation his victim is having in real life.
Bluejacking: the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers,
Bluesnarfing: the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs. This allows access to a calendar, contact list, emails and text messages, and on some phones users can steal pictures and private videos.