%0 Journal Article %T Blue Bugging Attack on Cell Phones with Bluetooth Technology %A Johanna Malla %A Diana Yacchirema %J Redifis %D 2012 %I Escuela Polit¨Ścnica Nacional %X This document describes the security modes provided by the Bluetooth wireless communication technology as well as the different types of attacks that are performed to detect vulnerabilities on devices incorporating this technology. The purpose of this paper is to present the performance of computer attack blue bugging to cell phones, has been developed for this application. Net C #. This application lets you perform various actions on the attacked phone such as: Read messages, writemessages, and call transfer files. It also presents some results of tests for the execution of the attack and the conclusions they reached. %K blue bugging %K bluetooth %K security %U http://redifis.epn.edu.ec/index.php/ReDiFIS/article/view/22