"The idea is for the attacker to attempt communicating with the device via a wireless network. Even if the victim's device does not complete the connection, the device's power will be used up at a higher rate than if it remained idle. An attacker can issue a high number of such connection requests to deplete batteries of all mobile devices in the proximity."
Monday, March 17, 2008
SANS Internet Storm Center; Cooperative Network Security Community - Internet Security - isc
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment