Security firm can connect to some Bluetooth phones and extract data quietly: Flaws in some phones allowed this group of researchers to write a tool that lets them simply connect, extract, and depart without a Bluetooth pairing procedure or alerting the phone's owner.