Monday, March 17, 2008

SANS Internet Storm Center; Cooperative Network Security Community - Internet Security - isc

"The idea is for the attacker to attempt communicating with the device via a wireless network. Even if the victim's device does not complete the connection, the device's power will be used up at a higher rate than if it remained idle. An attacker can issue a high number of such connection requests to deplete batteries of all mobile devices in the proximity."

No comments:

Post a Comment