Ask Question
14 August, 08:44

When an attacker uses bluetooth to copy e-mails, contact lists, or other files on the device, it is called?

+1
Answers (1)
  1. 14 August, 12:00
    0
    I think it's called NFC
Know the Answer?
Not Sure About the Answer?
Get an answer to your question ✅ “When an attacker uses bluetooth to copy e-mails, contact lists, or other files on the device, it is called? ...” in 📙 Computers & Technology if there is no answer or all answers are wrong, use a search bar and try to find the answer among similar questions.
Search for Other Answers