Re: Legality of blue tooth hacking

From: Paul Robertson (compuwar@gmail.com)
Date: Thu Mar 16 2006 - 10:35:22 EST


I'd think it'd mostly depend on the jurisdiction. Unauthorized or
improper access laws tend to cover these things pretty well- no matter
what the technology. My guess is that Cisco's legal department would
have a different opinion if they were consulted.

Paul

On 15 Mar 2006 13:48:05 -0000, mht3@earthlink.net <mht3@earthlink.net> wrote:
> What is the current legality of blue tooth hacking?
> At a recent Cisco security product meeting, I observed a security practice director outside snarfing phone numbers and addresses from the various people who were attending the meeting. He got up and presented the information saying there was no law preventing him from snarfing information. I seem to recall attending a conference a while back where the laws regarding this type of blue tooth snarfing was discussed.
>
> thanks for the assistance
>
> /m
>
> ------------------------------------------------------------------------------
> This List Sponsored by: Cenzic
>
> Concerned about Web Application Security?
> As attacks through web applications continue to rise, you need to proactively
> protect your applications from hackers. Cenzic has the most comprehensive
> solutions to meet your application security penetration testing and
> vulnerability management needs. You have an option to go with a managed
> service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm).
> Download FREE whitepaper on how a managed service can help you:
> http://www.cenzic.com/news_events/wpappsec.php
> And, now for a limited time we can do a FREE audit for you to confirm your
> results from other product. Contact us at request@cenzic.com
> ------------------------------------------------------------------------------
>
>

--
fora.compuwar.net
------------------------------------------------------------------------------
This List Sponsored by: Cenzic
Concerned about Web Application Security? 
As attacks through web applications continue to rise, you need to proactively 
protect your applications from hackers. Cenzic has the most comprehensive 
solutions to meet your application security penetration testing and 
vulnerability management needs. You have an option to go with a managed 
service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). 
Download FREE whitepaper on how a managed service can help you: 
http://www.cenzic.com/forms/ec.php?pubid=10025
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request@cenzic.com
------------------------------------------------------------------------------


This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:41 EDT