Bluejacking
Hackers take advantage of security flaws in mobile phones with bluetooth, taking control over them; making phone calls and stealing information.
Hackers take advantage of security flaws in mobile phones with bluetooth, taking control over them; making phone calls and stealing information.
Posted by Alex at 5:01 AM
Labels: Instructional
No comments:
Post a Comment