which type of bluetooth attack accesses unauthorized information