SlideShare a Scribd company logo
1 of 22
What is
bluejacking
 Bluejacking is the sending of
  unsolicited messages over Bluetooth
  to Bluetooth-enabled devices such as
  mobile phones, PDAs or laptop
  computers,etc.

 Bluetooth has a very limited range;
  usually around 10 meters on mobile
  phones, but laptops can reach up to
  100 meters with powerful
  transmitters.
Origin of Bluejacking
 This bluejack phenomenon started after a Malaysian IT
  consultant named “Ajack” posted a comment on a mobile
  phone forum.

 Ajack told IT Web that he used his Ericsson cellphone in a
 bank to send a message to someone with a Nokia 7650.

 Ajack did a Bluetooth discovery to see if there was another
  Bluetooth device around. Discovering a Nokia 7650 in the
  vicinity, he created a new contact and filled in the first name
  with ‘Buy Ericsson!' and sent a business card to the Nokia
  phone.
How to Bluejack
 Assuming that you now have a
  Bluetooth phone in your
  hands, the first thing to do is
  to make sure that Bluetooth is
  enabled. You will need to read
  the handbook of the particular
  phone (or PDA etc) that you
  have but somewhere in the
  Menu item you will find the
  item that enables and disabled
  Bluetooth.
How to Bluejack
 Your phone or PDA will start to search the airwaves for other devices
  within range.
 If you are lucky you will see a list of them appear, or it will say that it
  cannot find any.




 If the latter happens then relocate to another crowd or wait a while
  and try again.
 If you have a list of found devices then let the fun begin.
The various steps involved – in mobile
   1. First press the 5-way joystick down.
   2. Then choose options.
   3. Then choose "New contact"
   4. Then in the first line choose your desired
    message.
   5. Then press done.
   6. Then go to the contact.
   7. Then press options.
   8. Then scroll down to send.
   9. Then choose "Via Bluetooth"
   10. Then the phone will be searching for enabled
    Devices.
   11. Then press "Select"
The various steps involved – in
 computer/laptop
 1. Go to contacts in your Address
  Book program (e.g. Outlook)
 2. Create a new contact
 3. Enter the message into one of the
  'name' fields
 4. Save the new contact
 5. Go to the address book
 6. Right-click on the message/contact
 7. Go to action
 8. Go to Send to Bluetooth
 9. Click on other
 10. Select a device from the list and
  double click on it
Software Tools
• Bluespam: BlueSpam searches for all
  discoverable Bluetooth devices and sends a
  file to them (spams them) if they support
  OBEX.
• Meeting point: Meeting point is the perfect
  tools to search for Bluetooth devices. Combine
  it with any bluejacking tools and have lots of
  fun. This software is compatible with pocket
  PC, Windows.
• Freejack: Freejack is compatible to java
  phone like Nokia N-series
• Easyjacking (eJack): Allows sending of text
  Messages to other Bluetooth enables devices.
Usage of Bluejacking
 Bluejacking can be used in many fields
  and for various purposes like in the busy
  shopping centre,train station, high
  street,cinema,café/restaurant/pub,etc.

 The main use of bluejacking tools or
  bluejacking is in advertising purpose and
  location based purpose.

     Experimental results show that the
    system provides a viable solution for
    realizing    permission-based  mobile
    advertising.
Now remember that
bluetooth works only for
short range of distances, so
you need to find the
crowd. Bluejacking is very
new so not everyone will
have a bluetooth phone or
a PDA(Personal Digital
Assistant) so the bigger
crowd the more likely you
will find a “victim” on the
train, in the cafe        or
standing in line are all
good places to start……
Bluejackers often look for the receiving phone to
ping or the user to react. In order to carry out a
bluejacking,




the sending and receiving devices must be within
10 meters of one another.
Code of Ethics
• Bluejackers will only send messages/pictures. They will never
  try to 'hack' a device for the purpose of copying or modifying
  any files on any device or upload any executable files.

• Any such messages or pictures sent will not be of an insulting,
  libelous or vulgure in nature and will be copyright free or
  copyrighted by the sender.

• If no interest is shown by the recipient after 2 messages the
  bluejacker will desist and move on.
Code of Ethics
• The bluejacker will restrict their
  activity to 10 messages maximum
  unless in exceptional circumstances

• If the Bluejacker senses that he/she is
  causing distress rather than mirth to
  the recipient they will immediately
  decease all activity towards them.

•    If a bluejacker is caught 'in the act'
    he/she will be as co-operative as
    possible and not hide any details of
    their activity.
Related Concepts
               BlueSnarfing :
    “Bluesnarfing” is the term
    associated with downloading any
    and all information from a
    hacked device. Bluesnarfing is
    the theft of information from a
    wireless device through a
    Bluetooth connection, often
    between phones, desktops,
    laptops, and PDAs. This allows
    access to a calendar, contact list,
    emails and text messages.
    Bluesnarfing is much more
    serious in relation to Bluejacking
Related Concepts
Bluebugging: Bluebugging
 is a form of Bluetooth attack. In
 progression of discovery date,
 Bluetooth attack started with
 bluejacking, then bluesnarfing, and
 then      bluebugging.     Bluebug
 program allows the user to take
 control of a victim's phone to call
 the user's phone. This means that
 the Bluebug user can simply listen
 to any conversation his victim is
 having in real life.
How to Prevent Being
Bluejacked
      To prevent being
 Bluejacked,      disable
 Bluetooth     on     the
 mobile device when
 not in use. The device
 will not show up on a
 “Bluejacker’s” phone
 when he/she attempts
 to send a message and
 they do not queue up.
Good Practices for Bluetooth Enabled
Devices
    Whether someone is unwilling to partake in Bluejacking or just
    does not want to be bothered with these messages, the following
    are some good practices to consider:
   Do not reveal an identity when either sending or receiving
    Bluejacked messages.
   Never threaten anyone.
   Never send messages that can be considered abusive.
   Never reveal personal information in response to a Bluejacked
    message.
   Disable Blue Tooth option if not in use in order to prevent
    Bluejacked messages.
   If a Bluejacking message is received, delete the message voice
    accepting it or it will be added to the device’s address book.
Warning
• Never try to 'hack' a device
  for the purpose of copying or
  modifying any files on any
  device or upload any
  executable files. By hacking a
  device you are committing an
  offence under the computer
  misuse act 1990, which
  states it is an offence to
  obtain unauthorized access to
  any computer
Conclusion
  Bluejacking is a technique by which we can interact
with new people and has ability to revolutionerise
market by sending advertisement about the product,
enterprise etc. on the Bluetooth configured mobile
phone so that the people get aware about them by
seeing them on the phone.
Thank

More Related Content

What's hot

Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
Manish Sharma
 

What's hot (20)

Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Final bluejacking
Final bluejackingFinal bluejacking
Final bluejacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluetooth security
Bluetooth securityBluetooth security
Bluetooth security
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technology
 
Blue jacking
Blue jackingBlue jacking
Blue jacking
 
Bluetooth Power point presentation
Bluetooth Power point presentationBluetooth Power point presentation
Bluetooth Power point presentation
 
Blue1
Blue1Blue1
Blue1
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Google Glass
Google GlassGoogle Glass
Google Glass
 
Bluetooth presentation
Bluetooth presentationBluetooth presentation
Bluetooth presentation
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 

Viewers also liked

5G MOBILE TECHNOLOGY PPT
5G MOBILE TECHNOLOGY PPT5G MOBILE TECHNOLOGY PPT
5G MOBILE TECHNOLOGY PPT
priyanka reddy
 
INTERNET PROTOCOL TELEVISION SEMINAR PPT
INTERNET PROTOCOL TELEVISION SEMINAR PPTINTERNET PROTOCOL TELEVISION SEMINAR PPT
INTERNET PROTOCOL TELEVISION SEMINAR PPT
Anil Mahapatra
 

Viewers also liked (18)

Bluejacking
BluejackingBluejacking
Bluejacking
 
The sixth sense technology complete ppt
The sixth sense technology complete pptThe sixth sense technology complete ppt
The sixth sense technology complete ppt
 
Space mouse
Space mouseSpace mouse
Space mouse
 
5G MOBILE TECHNOLOGY PPT
5G MOBILE TECHNOLOGY PPT5G MOBILE TECHNOLOGY PPT
5G MOBILE TECHNOLOGY PPT
 
ERP
ERPERP
ERP
 
Femtocell
FemtocellFemtocell
Femtocell
 
ppt on femtocell
ppt on femtocellppt on femtocell
ppt on femtocell
 
Airborne Internet
Airborne InternetAirborne Internet
Airborne Internet
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 
3D-Doctor
3D-Doctor3D-Doctor
3D-Doctor
 
Wi vi ppt
Wi vi pptWi vi ppt
Wi vi ppt
 
Energy Saving fan .ppt
Energy Saving   fan .ppt Energy Saving   fan .ppt
Energy Saving fan .ppt
 
Cluster computing
Cluster computingCluster computing
Cluster computing
 
INTERNET PROTOCOL TELEVISION SEMINAR PPT
INTERNET PROTOCOL TELEVISION SEMINAR PPTINTERNET PROTOCOL TELEVISION SEMINAR PPT
INTERNET PROTOCOL TELEVISION SEMINAR PPT
 
Space Mouse
Space MouseSpace Mouse
Space Mouse
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense Technology
 
Military Radar
Military RadarMilitary Radar
Military Radar
 
Soft computing
Soft computingSoft computing
Soft computing
 

Similar to Bluejacking

208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
smilichitti
 
3 Blue Presentation
3 Blue Presentation3 Blue Presentation
3 Blue Presentation
ali100
 
Advocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online CourseAdvocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online Course
Adam Varn
 

Similar to Bluejacking (20)

Blue Jacking
Blue Jacking Blue Jacking
Blue Jacking
 
Blue Jacking
Blue JackingBlue Jacking
Blue Jacking
 
Bluetooth Attacks.docx
Bluetooth Attacks.docxBluetooth Attacks.docx
Bluetooth Attacks.docx
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
 
Blue jacking mercy
Blue jacking mercyBlue jacking mercy
Blue jacking mercy
 
blue-JACKING.pptx
blue-JACKING.pptxblue-JACKING.pptx
blue-JACKING.pptx
 
Blue jacking
Blue jackingBlue jacking
Blue jacking
 
bluejacking
bluejackingbluejacking
bluejacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluetooth based-chatting-system-using-android-docx
Bluetooth based-chatting-system-using-android-docxBluetooth based-chatting-system-using-android-docx
Bluetooth based-chatting-system-using-android-docx
 
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
 
SEMINAR ON bluejackng
SEMINAR ON bluejackngSEMINAR ON bluejackng
SEMINAR ON bluejackng
 
3 Blue Presentation
3 Blue Presentation3 Blue Presentation
3 Blue Presentation
 
Mobile Device Best Practices.pdf
Mobile Device Best Practices.pdfMobile Device Best Practices.pdf
Mobile Device Best Practices.pdf
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
 
Bluetooth Hacking
Bluetooth HackingBluetooth Hacking
Bluetooth Hacking
 
Bluejacking ppt.pptx
Bluejacking ppt.pptxBluejacking ppt.pptx
Bluejacking ppt.pptx
 
Advocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online CourseAdvocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online Course
 

Recently uploaded

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Recently uploaded (20)

Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 

Bluejacking

  • 1.
  • 2. What is bluejacking  Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers,etc.  Bluetooth has a very limited range; usually around 10 meters on mobile phones, but laptops can reach up to 100 meters with powerful transmitters.
  • 3. Origin of Bluejacking  This bluejack phenomenon started after a Malaysian IT consultant named “Ajack” posted a comment on a mobile phone forum.  Ajack told IT Web that he used his Ericsson cellphone in a bank to send a message to someone with a Nokia 7650.  Ajack did a Bluetooth discovery to see if there was another Bluetooth device around. Discovering a Nokia 7650 in the vicinity, he created a new contact and filled in the first name with ‘Buy Ericsson!' and sent a business card to the Nokia phone.
  • 4. How to Bluejack  Assuming that you now have a Bluetooth phone in your hands, the first thing to do is to make sure that Bluetooth is enabled. You will need to read the handbook of the particular phone (or PDA etc) that you have but somewhere in the Menu item you will find the item that enables and disabled Bluetooth.
  • 5. How to Bluejack  Your phone or PDA will start to search the airwaves for other devices within range.  If you are lucky you will see a list of them appear, or it will say that it cannot find any.  If the latter happens then relocate to another crowd or wait a while and try again.  If you have a list of found devices then let the fun begin.
  • 6.
  • 7. The various steps involved – in mobile  1. First press the 5-way joystick down.  2. Then choose options.  3. Then choose "New contact"  4. Then in the first line choose your desired message.  5. Then press done.  6. Then go to the contact.  7. Then press options.  8. Then scroll down to send.  9. Then choose "Via Bluetooth"  10. Then the phone will be searching for enabled Devices.  11. Then press "Select"
  • 8. The various steps involved – in computer/laptop  1. Go to contacts in your Address Book program (e.g. Outlook)  2. Create a new contact  3. Enter the message into one of the 'name' fields  4. Save the new contact  5. Go to the address book  6. Right-click on the message/contact  7. Go to action  8. Go to Send to Bluetooth  9. Click on other  10. Select a device from the list and double click on it
  • 9.
  • 10. Software Tools • Bluespam: BlueSpam searches for all discoverable Bluetooth devices and sends a file to them (spams them) if they support OBEX. • Meeting point: Meeting point is the perfect tools to search for Bluetooth devices. Combine it with any bluejacking tools and have lots of fun. This software is compatible with pocket PC, Windows. • Freejack: Freejack is compatible to java phone like Nokia N-series • Easyjacking (eJack): Allows sending of text Messages to other Bluetooth enables devices.
  • 11. Usage of Bluejacking  Bluejacking can be used in many fields and for various purposes like in the busy shopping centre,train station, high street,cinema,café/restaurant/pub,etc.  The main use of bluejacking tools or bluejacking is in advertising purpose and location based purpose.  Experimental results show that the system provides a viable solution for realizing permission-based mobile advertising.
  • 12. Now remember that bluetooth works only for short range of distances, so you need to find the crowd. Bluejacking is very new so not everyone will have a bluetooth phone or a PDA(Personal Digital Assistant) so the bigger crowd the more likely you will find a “victim” on the train, in the cafe or standing in line are all good places to start……
  • 13. Bluejackers often look for the receiving phone to ping or the user to react. In order to carry out a bluejacking, the sending and receiving devices must be within 10 meters of one another.
  • 14. Code of Ethics • Bluejackers will only send messages/pictures. They will never try to 'hack' a device for the purpose of copying or modifying any files on any device or upload any executable files. • Any such messages or pictures sent will not be of an insulting, libelous or vulgure in nature and will be copyright free or copyrighted by the sender. • If no interest is shown by the recipient after 2 messages the bluejacker will desist and move on.
  • 15. Code of Ethics • The bluejacker will restrict their activity to 10 messages maximum unless in exceptional circumstances • If the Bluejacker senses that he/she is causing distress rather than mirth to the recipient they will immediately decease all activity towards them. • If a bluejacker is caught 'in the act' he/she will be as co-operative as possible and not hide any details of their activity.
  • 16. Related Concepts  BlueSnarfing : “Bluesnarfing” is the term associated with downloading any and all information from a hacked device. Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs. This allows access to a calendar, contact list, emails and text messages. Bluesnarfing is much more serious in relation to Bluejacking
  • 17. Related Concepts Bluebugging: Bluebugging is a form of Bluetooth attack. In progression of discovery date, Bluetooth attack started with bluejacking, then bluesnarfing, and then bluebugging. Bluebug program allows the user to take control of a victim's phone to call the user's phone. This means that the Bluebug user can simply listen to any conversation his victim is having in real life.
  • 18. How to Prevent Being Bluejacked To prevent being Bluejacked, disable Bluetooth on the mobile device when not in use. The device will not show up on a “Bluejacker’s” phone when he/she attempts to send a message and they do not queue up.
  • 19. Good Practices for Bluetooth Enabled Devices Whether someone is unwilling to partake in Bluejacking or just does not want to be bothered with these messages, the following are some good practices to consider:  Do not reveal an identity when either sending or receiving Bluejacked messages.  Never threaten anyone.  Never send messages that can be considered abusive.  Never reveal personal information in response to a Bluejacked message.  Disable Blue Tooth option if not in use in order to prevent Bluejacked messages.  If a Bluejacking message is received, delete the message voice accepting it or it will be added to the device’s address book.
  • 20. Warning • Never try to 'hack' a device for the purpose of copying or modifying any files on any device or upload any executable files. By hacking a device you are committing an offence under the computer misuse act 1990, which states it is an offence to obtain unauthorized access to any computer
  • 21. Conclusion Bluejacking is a technique by which we can interact with new people and has ability to revolutionerise market by sending advertisement about the product, enterprise etc. on the Bluetooth configured mobile phone so that the people get aware about them by seeing them on the phone.
  • 22. Thank