header bg

Scan QR code or get instant email to install app


Which of the following forms of Bluetooth hacking was most likely used to attack Jim's phone in the case Jim, a smartphone user, receives a bill from his provider that contains fees for calling international numbers he is sure he hasn't called?

A Bluebugging

Related Information