Penetration Testing mailing list archives
RE: Legality of blue tooth hacking
From: "Chris Dalton" <CGDALTON () hibernia com>
Date: Thu, 16 Mar 2006 11:36:38 -0600
If you hack the code how does that affect the software license and ownership of the software? Seems like Legal would not be happy. Chris G. Dalton C.P.A. Corporate Audit Services Capital One Financial 1-504-533-6419 phone 1-504-533-2355 fax
"Craig Wright" <cwright () bdosyd com au> 03/15/06 10:19 PM >>>
Hi As the simplest of answers, "Unauthorised access to computer material". Being a phone does not stop it also vbeing a computer for the definition of the Act. Just because the data is not secure does not make the act legal. I fail to see how the person could argue that the data was public. This would be impossible if the device was not broadcasting but only responded. Regards Craig -----Original Message----- From: mht3 () earthlink net [mailto:mht3 () earthlink net] Sent: 16 March 2006 12:48 To: pen-test () securityfocus com Subject: Legality of blue tooth hacking What is the current legality of blue tooth hacking? At a recent Cisco security product meeting, I observed a security practice director outside snarfing phone numbers and addresses from the various people who were attending the meeting. He got up and presented the information saying there was no law preventing him from snarfing information. I seem to recall attending a conference a while back where the laws regarding this type of blue tooth snarfing was discussed. thanks for the assistance /m ------------------------------------------------------------------------ ------ This List Sponsored by: Cenzic Concerned about Web Application Security? As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com ------------------------------------------------------------------------ ------ Liability limited by a scheme approved under Professional Standards Legislation in respect of matters arising within those States and Territories of Australia where such legislation exists. DISCLAIMER The information contained in this email and any attachments is confidential. If you are not the intended recipient, you must not use or disclose the information. If you have received this email in error, please inform us promptly by reply email or by telephoning +61 2 9286 5555. Please delete the email and destroy any printed copy. Any views expressed in this message are those of the individual sender. You may not rely on this message as advice unless it has been electronically signed by a Partner of BDO or it is subsequently confirmed by letter or fax signed by a Partner of BDO. BDO accepts no liability for any damage caused by this email or its attachments due to viruses, interference, interception, corruption or unauthorised access. ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/forms/ec.php?pubid=10025 And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com ------------------------------------------------------------------------------ ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/forms/ec.php?pubid=10025 And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com ------------------------------------------------------------------------------
Current thread:
- Legality of blue tooth hacking mht3 (Mar 15)
- Re: Legality of blue tooth hacking Cedric Blancher (Mar 16)
- Re: Legality of blue tooth hacking Paul Robertson (Mar 16)
- Re: Legality of blue tooth hacking Tim Hurman (Mar 16)
- <Possible follow-ups>
- RE: Legality of blue tooth hacking Shenk, Jerry A (Mar 16)
- RE: Legality of blue tooth hacking Craig Wright (Mar 16)
- RE: Legality of blue tooth hacking Chris Dalton (Mar 16)
- RE: Legality of blue tooth hacking Craig Wright (Mar 16)
- RE: Legality of blue tooth hacking Cedric Blancher (Mar 18)
- Message not available
- RE: Legality of blue tooth hacking Mark Teicher (Mar 19)
- RE: Legality of blue tooth hacking Mark Teicher (Mar 20)
- Message not available