Hacking Bluetooth Connection: Using Bluetooth technology, hackers get unauthorized access to a specific mobile phone, laptop, or PDA (Personal Digital Assistant).
- Bluejacking: Using Bluetooth technology, hackers connect to Bluetooth-enabled devices and send some message to another such device. Although it does not damage the privacy or device system, the threat-risk is calculated based on transmitted message content.
- Bluesnarfing: Hackers get access to personal files like photos, contacts, and SMS.