michaeltreece1230 michaeltreece1230 04-05-2018 Computers and Technology contestada When an attacker uses bluetooth to copy e-mails, contact lists, or other files on the device, it is called?