Following a spate of reports about sensitive business data stolen using iPods (Podslurping) and bluetooth devices (Bluesnarfing
), Icomm has also urged small businesses to be vigilant against the use of digital cameras.
Bluesnarfing, explains Laurie, "is basically the ability over the Bluetooth channel to make an unauthorized connection to a phone and copy the contents of the phone book, calendar," and some technical details including the phone's IMEI number--a unique numerical identifier of cell phones that forgers need to clone a phone.
The problem with bluesnarfing goes far beyond loss of privacy, Laurie explains.
Austrian IT-security researcher Martin Herfurt conducted bluesnarfing experiments at CeBIT 2004, a heavily attended computer exhibition held annually in Germany.
Each was vulnerable to bluesnarfing. "On the London Underground during rush hour, I found over 300 devices in the space of about an hour and half," he says, adding that in London he can find a new target every ten seconds or so.
This is a more serious attack than bluesnarfing, which only provides access to restricted parts of a Bluetooth device.
Once the devices are discovered, they become exposed to threats such as bluesnarfing.
These types of attacks work by pushing data onto a Bluetooth device rather than pulling data off a device (as with bluesnarfing).
Hackers can download confidential details and even photos from up to 87 yards away using a technique called Bluesnarfing.
With Bluesnarfing hackers use a laptop which scans to find Bluetooth-compatible phones which can then be targeted.