Which of the following Bluetooth hacking techniques refers to the theft of information from a wireless device through Bluetooth?
A. Bluesmacking
B. Bluesnarfing
C. Bluejacking
D. Bluebugging
A. Bluesmacking
B. Bluesnarfing
C. Bluejacking
D. Bluebugging