Describe two attacks associated with Bluetooth in detail (in theory). How these attacks can be detected and prevented.