"bluesnarfing" meaning in All languages combined

See bluesnarfing on Wiktionary

Noun [English]

Etymology: Blue(tooth) + snarfing. Head templates: {{en-noun|-}} bluesnarfing (uncountable)
  1. Unauthorized access to the information on a wireless device through a Bluetooth connection, often between phones, desktops, laptops, or PDAs. Wikipedia link: bluesnarfing Tags: uncountable Related terms: bluebugging, bluejacking
    Sense id: en-bluesnarfing-en-noun-clxi9-Da Categories (other): English entries with incorrect language header, Pages with 1 entry, Pages with entries
{
  "etymology_text": "Blue(tooth) + snarfing.",
  "head_templates": [
    {
      "args": {
        "1": "-"
      },
      "expansion": "bluesnarfing (uncountable)",
      "name": "en-noun"
    }
  ],
  "lang": "English",
  "lang_code": "en",
  "pos": "noun",
  "senses": [
    {
      "categories": [
        {
          "kind": "other",
          "name": "English entries with incorrect language header",
          "parents": [
            "Entries with incorrect language header",
            "Entry maintenance"
          ],
          "source": "w"
        },
        {
          "kind": "other",
          "name": "Pages with 1 entry",
          "parents": [],
          "source": "w"
        },
        {
          "kind": "other",
          "name": "Pages with entries",
          "parents": [],
          "source": "w"
        }
      ],
      "examples": [
        {
          "ref": "2005, Teck Sung Yap and Hong Tat Ewe, A Mobile Phone Malicious Software Detection Model with Behavior Checker, in Web and Communication Technologies and Internet-Related Social Issues — HSI 2005: 3rd International Conference on Human.Society@Internet — Tokyo, Japan, July 2005: Proceedings (edited by Shinji Shimojo, Shingo Ichii, Tok Wang Ling, and Kwan-Ho Song; →ISBN (10) (13)), page 58",
          "text": "Bluejacking and bluesnarfing are the two forms of new intrusion. Bluejacking is a technique of sending anonymous messages to Bluetooth enabled device and bluesnarfing allows attackers to hack in and download data stored in mobile phones such as contact details and diary entries without leaving any trace [7]."
        },
        {
          "ref": "2006 December 2, Eric Cole, Sandra Ring, Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft →ISBN (10) (13)), chapter 12: “Wireless Security Project Plan”, page 462",
          "text": "Stealing calendar and contact information via bluesnarfing requires both Bluetooth devices be on and available. The quickest and easiest way to avoid bluesnarfing (which requires about two to three minutes of continuous connection time) is to disable Bluetooth when not specifically in use."
        },
        {
          "ref": "2007, James M. Byrne, Donald J. Rebovich (editors), The New Technology of Crime, Law and Social Control →ISBN (10) (13)), pages 29–30",
          "text": "“Bluesnarfing”, sometimes also called Bluejacking and Podslurping, is the exploitation of Bluetooth-enabled devices. [[ […] ]] The most infamous instance of Bluesnarfing occurred in February 2005, when a Sidekick II mobile communication device owned by the celebrity Paris Hilton was compromised. Information contained on the device, including data and images, was stolen. Bluesnarfing occurs when an individual in relatively close proximity to the victim uses a Bluetooth-enabled device to remove data from a victim with another Bluetooth-enabled device."
        }
      ],
      "glosses": [
        "Unauthorized access to the information on a wireless device through a Bluetooth connection, often between phones, desktops, laptops, or PDAs."
      ],
      "id": "en-bluesnarfing-en-noun-clxi9-Da",
      "links": [
        [
          "information",
          "information"
        ],
        [
          "wireless",
          "wireless"
        ],
        [
          "device",
          "device"
        ],
        [
          "Bluetooth",
          "Bluetooth"
        ],
        [
          "connection",
          "connection"
        ],
        [
          "desktop",
          "desktop"
        ],
        [
          "laptop",
          "laptop"
        ],
        [
          "PDA",
          "PDA"
        ]
      ],
      "related": [
        {
          "word": "bluebugging"
        },
        {
          "word": "bluejacking"
        }
      ],
      "tags": [
        "uncountable"
      ],
      "wikipedia": [
        "bluesnarfing"
      ]
    }
  ],
  "word": "bluesnarfing"
}
{
  "etymology_text": "Blue(tooth) + snarfing.",
  "head_templates": [
    {
      "args": {
        "1": "-"
      },
      "expansion": "bluesnarfing (uncountable)",
      "name": "en-noun"
    }
  ],
  "lang": "English",
  "lang_code": "en",
  "pos": "noun",
  "related": [
    {
      "word": "bluebugging"
    },
    {
      "word": "bluejacking"
    }
  ],
  "senses": [
    {
      "categories": [
        "English entries with incorrect language header",
        "English lemmas",
        "English nouns",
        "English uncountable nouns",
        "Pages with 1 entry",
        "Pages with entries"
      ],
      "examples": [
        {
          "ref": "2005, Teck Sung Yap and Hong Tat Ewe, A Mobile Phone Malicious Software Detection Model with Behavior Checker, in Web and Communication Technologies and Internet-Related Social Issues — HSI 2005: 3rd International Conference on Human.Society@Internet — Tokyo, Japan, July 2005: Proceedings (edited by Shinji Shimojo, Shingo Ichii, Tok Wang Ling, and Kwan-Ho Song; →ISBN (10) (13)), page 58",
          "text": "Bluejacking and bluesnarfing are the two forms of new intrusion. Bluejacking is a technique of sending anonymous messages to Bluetooth enabled device and bluesnarfing allows attackers to hack in and download data stored in mobile phones such as contact details and diary entries without leaving any trace [7]."
        },
        {
          "ref": "2006 December 2, Eric Cole, Sandra Ring, Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft →ISBN (10) (13)), chapter 12: “Wireless Security Project Plan”, page 462",
          "text": "Stealing calendar and contact information via bluesnarfing requires both Bluetooth devices be on and available. The quickest and easiest way to avoid bluesnarfing (which requires about two to three minutes of continuous connection time) is to disable Bluetooth when not specifically in use."
        },
        {
          "ref": "2007, James M. Byrne, Donald J. Rebovich (editors), The New Technology of Crime, Law and Social Control →ISBN (10) (13)), pages 29–30",
          "text": "“Bluesnarfing”, sometimes also called Bluejacking and Podslurping, is the exploitation of Bluetooth-enabled devices. [[ […] ]] The most infamous instance of Bluesnarfing occurred in February 2005, when a Sidekick II mobile communication device owned by the celebrity Paris Hilton was compromised. Information contained on the device, including data and images, was stolen. Bluesnarfing occurs when an individual in relatively close proximity to the victim uses a Bluetooth-enabled device to remove data from a victim with another Bluetooth-enabled device."
        }
      ],
      "glosses": [
        "Unauthorized access to the information on a wireless device through a Bluetooth connection, often between phones, desktops, laptops, or PDAs."
      ],
      "links": [
        [
          "information",
          "information"
        ],
        [
          "wireless",
          "wireless"
        ],
        [
          "device",
          "device"
        ],
        [
          "Bluetooth",
          "Bluetooth"
        ],
        [
          "connection",
          "connection"
        ],
        [
          "desktop",
          "desktop"
        ],
        [
          "laptop",
          "laptop"
        ],
        [
          "PDA",
          "PDA"
        ]
      ],
      "tags": [
        "uncountable"
      ],
      "wikipedia": [
        "bluesnarfing"
      ]
    }
  ],
  "word": "bluesnarfing"
}

Download raw JSONL data for bluesnarfing meaning in All languages combined (2.8kB)


This page is a part of the kaikki.org machine-readable All languages combined dictionary. This dictionary is based on structured data extracted on 2024-12-21 from the enwiktionary dump dated 2024-12-04 using wiktextract (d8cb2f3 and 4e554ae). The data shown on this site has been post-processed and various details (e.g., extra categories) removed, some information disambiguated, and additional data merged from other sources. See the raw data download page for the unprocessed wiktextract data.

If you use this data in academic research, please cite Tatu Ylonen: Wiktextract: Wiktionary as Machine-Readable Structured Data, Proceedings of the 13th Conference on Language Resources and Evaluation (LREC), pp. 1317-1325, Marseille, 20-25 June 2022. Linking to the relevant page(s) under https://kaikki.org would also be greatly appreciated.