tag:blogger.com,1999:blog-4065770693499115314.post1304755161629594167..comments2023-10-02T12:01:53.774+03:00Comments on Бизнес без опасности: NIST о безопасности WLAN и BluetoothАлексей Лукацкийhttp://www.blogger.com/profile/08434361034703403028noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-4065770693499115314.post-35889567826213886252011-10-05T20:22:09.046+04:002011-10-05T20:22:09.046+04:00Это ты им напиши ;-)Это ты им напиши ;-)Алексей Лукацкийhttps://www.blogger.com/profile/08434361034703403028noreply@blogger.comtag:blogger.com,1999:blog-4065770693499115314.post-28291278483198425262011-10-05T17:46:28.502+04:002011-10-05T17:46:28.502+04:00This attack forces a connection to a Bluetooth dev...This attack forces a connection to a Bluetooth device, allowing access to data stored on the device including the device’s international mobile equipment identity (IMEI). The IMEI is a unique identifier for each device that an attacker could potentially use to route all incoming calls from the user’s device to the attacker’s device.<br /><br />ЛОЛШТО?arkanoidhttps://www.blogger.com/profile/16788299034814627694noreply@blogger.com