bluesnarfing

Etymology
+.

Noun

 * 1) Unauthorized access to the information on a wireless device through a Bluetooth connection, often between phones, desktops, laptops, or PDAs.
 * 2) * 2005, Teck Sung Yap and Hong Tat Ewe, A Mobile Phone Malicious Software Detection Model with Behavior Checker, in Web and Communication Technologies and Internet-Related Social Issues — HSI 2005: 3rd International Conference on Human.Society@Internet — Tokyo, Japan, July 2005: Proceedings (edited by Shinji Shimojo, Shingo Ichii, Tok Wang Ling, and Kwan-Ho Song; ISBN 3540278303 (10), ISBN 978-3540278306 (13)), page 58:
 * Bluejacking and bluesnarfing are the two forms of new intrusion. Bluejacking is a technique of sending anonymous messages to Bluetooth enabled device and bluesnarfing allows attackers to hack in and download data stored in mobile phones such as contact details and diary entries without leaving any trace [7].
 * 1) * 2006 December 2, Eric Cole, Sandra Ring, Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft ISBN 1597491012 (10), ISBN 978-1597491013 (13)), chapter 12: “Wireless Security Project Plan”, page 462:
 * Stealing calendar and contact information via bluesnarfing requires both Bluetooth devices be on and available. The quickest and easiest way to avoid bluesnarfing (which requires about two to three minutes of continuous connection time) is to disable Bluetooth when not specifically in use.
 * 1) * 2007, James M. Byrne, Donald J. Rebovich (editors), The New Technology of Crime, Law and Social Control ISBN 1881798739 (10), ISBN 978-1881798736 (13)), pages 29–30:
 * “Bluesnarfing”, sometimes also called Bluejacking and Podslurping, is the exploitation of Bluetooth-enabled devices. [ [] ] The most infamous instance of Bluesnarfing occurred in February 2005, when a Sidekick II mobile communication device owned by the celebrity Paris Hilton was compromised. Information contained on the device, including data and images, was stolen. Bluesnarfing occurs when an individual in relatively close proximity to the victim uses a Bluetooth-enabled device to remove data from a victim with another Bluetooth-enabled device.