Basic attacks
Voicemail hacking
An
introduction
and
Wikipedia
Murdoch scandal
in UK
A
how to do it
(untested)
Bluetooth hacking
An
example
of the hack
A
video
using the Ultimate Bluetooth
An
YouTube video
also using Bluetooth
A
summary
of the tools
Previous slide