Alice is investigating a type of attack where an attacker us…
Alice is investigating a type of attack where an attacker uses a short-range wireless communication protocol to send unsolicited messages or contacts to nearby devices without their consent. This technique exploits device discovery features to deliver unexpected messages that may cause annoyance or be used in social engineering, but does not typically involve accessing files or data on the target device. What type of attack is this?