1. What is BlueSnarfing and BlueJacking in reference to the types of Bluetooth attacks? What are some of the tools that can be used to perform these types of attacks?
2. What are the different types of attacks launched against USB devices and countermeasures users can take to protect their devices?