2. WHAT IS BLUEJACKING?
Bluejacking is used for sending unauthorized messages to
another Bluetooth device. Bluetooth is a high-speed but
very short-range wireless technology for exchanging data
between desktop and mobile computers and other devices.
3. ORIGIN OF BLUE JACKING
Bluejacking was reportedly first carried out between
2001 and 2003 by a Malaysian IT consultant who used
his phone to advertise Ericsson to a single Nokia
7650 phone owner in a Malaysian bank
4. RANGE OF BLUEJACKING
Bluejacking is completely based on the Bluetooth technology.
Bluetooth protocol can work within a very limited range usually
around 10 meters for mobile devices and up to 100 meters for laptop
computers.
6. BLUE-SNARFING
Blue-snarfing is the theft of information from a wireless device
through a Bluetooth connection. Bluetooth is a high-speed but
very short-range wireless technology for exchanging data
between desktop and mobile computers, personal digital
assistants (PDAs), and other devices.
7. BLUEBUGGING
Bluebugging is a form of Bluetooth attack often caused by a lack of
awareness. It was developed after the onset of bluejacking and blue-
snarfing. Similar to blue-snarfing, bluebugging accesses and uses all
phone features[1] but is limited by the transmitting power of class 2
Bluetooth radios, normally capping its range at 10–15 meters.
8. ADVANTAGES & DISADVANTAGES
Low cost.
Easy to use.
It can also penetrate through walls.
It creates an Adhoc connection
immediately without any wires.
It is used for voice and data transfer.
Bluejacking is also confused with
Bluesnarfing which is the way in which
mobile phones are illegally hacked via
Bluetooth
• Virus attacks
9. PREVENTION
• There is hardly any softaware available to prevent or detect
bluejacking.
• Turn off Bluetooth.
• Don’t put device in connectable mode.
10. CONCLUSION
Bluejacking is a harmless and secure technology.
It does have some drawbacks but they can be
prevented by using certain measures. It does
have many advantages also.