Data theft can be categorized as: Hacking, Rootkit or backdoor, Thumbsucking (copying confidential data using thumb devices), Posing (aggregation of users' information from cookies), Podslurping (data stealing using iPods), Bluesnarfing
(stealing data using Bluetooth devices), and Spyware (gathers personal or system specific information without user notification and sends to spyware creators) [1,6,12,18].
, explains Laurie, "is basically the ability over the Bluetooth channel to make an unauthorized connection to a phone and copy the contents of the phone book, calendar," and some technical details including the phone's IMEI number--a unique numerical identifier of cell phones that forgers need to clone a phone.
Hackers can download confidential phone numbers, diary entries and even photos from up to 87 yards away using a technique called Bluesnarfing
Adam Laurie, who runs a computer security company, said he has written software allowing him to download information from phones equipped with the latest Bluetooth technology in a technique known as Bluesnarfing
Shut down Bluetooth in public to guard against Bluejacking or Bluesnarfing
attacks where the hacker gains access to phonebook and calendar information and can divert calls to their own phone