The Bluebag: A Mobile, Covert Bluetooth Attack And Infection Device presented at Blackhat USA 2005

by Claudio Merloni, Luca Carettoni,

Tags: Security

Summary : How could an attacker steal the phone
numbers stored on your mobile, eavesdrop your conversations, see what
you're typing on the keyboard, take pictures of the room you're in, and
monitor everything you're doing, without ever getting in the range of
your Bluetooth mobile phone?