Ce diaporama a bien été signalé.
Le téléchargement de votre SlideShare est en cours. ×

Blue jacking

Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Prochain SlideShare
Blue Jacking
Blue Jacking
Chargement dans…3
×

Consultez-les par la suite

1 sur 3 Publicité

Plus De Contenu Connexe

Publicité

Plus récents (20)

Blue jacking

  1. 1. BLUE JACKING Bluejacking allows phone users to send business cards anonymously using Bluetooth wireless technology. Bluejacking does not involve the removal or alteration of any data from thedevice. These business cards often have a clever or flirtatious message rather than the typical name and phone number. Bluejackers often look for the receiving phone to ping or the user to react. They then send another, more personal message to that device. Once again, in order to carry out a bluejacking, the sending and receiving devices must be within 10 meters of one another. Phone owners who receive bluejack messages should refuse to add the contacts to their address book. Devices that are set in non-discoverable mode are not susceptible to bluejacking. * * [Source: Bluetooth wireless technology Hacking Information] Bluejacking From Wikipedia, the free encyclopedia This article needs additional citations for verification. Please help improve this article byadding citations to reliable sources. Unsourced material may be challenged and removed.(January 2008) This Siemens M75 is Bluejacking the Sony Ericsson K600i pictured below
  2. 2. This Sony Ericsson K600i is getting Bluejacked by the Siemens M75 pictured above. The text at the bottom of the screen reads "Add to contacts?" in Norwegian. Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e., for bluedating or bluechat) to another Bluetooth-enabled device via the OBEX protocol. Bluetooth has a very limited range, usually around 10 metres (32.8 ft) on mobile phones, but laptops can reach up to 100 metres (328 ft) with powerful (Class 1) transmitters. Origins[edit] Bluejacking was reportedly first carried out by a Malaysian IT consultant who used his phone to advertise Sony Ericsson. He also invented the name, which purports to be an amalgam ofBluetooth and ajack, his username on Esato, a Sony Ericsson fan online forum. Jacking is, however, an extremely common shortening of hijack, the act of taking over something.[1][2] Usage[edit] Bluejacking is usually harmless, but because bluejacked people generally don't know what has happened, they may think that their phone is malfunctioning. Usually, a bluejacker will only send a text message, but with modern phones it's possible to send images or sounds as well. Bluejacking has been used in guerrilla marketing campaigns to promoteadvergames. With the increase in the availability of Bluetooth enabled devices, it is often reported that devices have become vulnerable to virus attacks and even complete take over of devices through a trojan horse program although most of these reports are easily debunked.
  3. 3. Bluejacking is also confused with Bluesnarfing which is the way in which mobile phones are illegally hacked via Bluetooth. See also[edit] Bluesnarfing Bluebugging References[edit] 1. Jump up^ Do You Speak American . Words That Shouldn't Be? . Sez Who? . Cyberspace | PBS 2. Jump up^ Bluejacking ‘a harmless prank' Categories: Bluetooth Spamming

×