Ask Question

When an attacker uses bluetooth to copy e-mails, contact lists, or other files on the device, it is called?

+1
Answers (1)
  1. 23 July, 04:14
    0
    I think it's called NFC
Know the Answer?
Not Sure About the Answer?
Find an answer to your question 👍 “When an attacker uses bluetooth to copy e-mails, contact lists, or other files on the device, it is called? ...” in 📗 Computers & Technology if the answers seem to be not correct or there’s no answer. Try a smart search to find answers to similar questions.
Search for Other Answers