SlideShare une entreprise Scribd logo
1  sur  21
Seminar OnSeminar On
BluejackingBluejacking
INTRODUCTION
ORIGIN OF BLUEJACKING
HOW TO BLUEJACK
SOFTWARE TOOLS
USES OF BLUEJACKING
CODE OF ETHICS
HOW TO PREVENT BEING BLUEJACKING
WARNING
CONCLUSION
PRESENTATION CONTENTPRESENTATION CONTENT
What is
bluejacking
 Bluejacking is the sending of
unsolicited messages over
Bluetooth to Bluetooth-
enabled devices such as
mobile phones, PDAs or
laptop computers,etc.
 Bluetooth has a very limited
range; usually around 10
meters on mobile phones, but
laptops can reach up to 100
meters with powerful
transmitters.
Origin of Bluejacking
 This bluejack phenomenon started after a
Malaysian IT consultant named “Ajack” posted a
comment on a mobile phone forum.
 Ajack told IT Web that he used his Ericsson
cellphone in a bank to send a message to
someone with a Nokia 7650.
 Ajack did a Bluetooth discovery to see if there
was another Bluetooth device around.
Discovering a Nokia 7650 in the vicinity, he
created a new contact and filled in the first name
with ‘Buy Ericsson!' and sent a business card to
How to Bluejack
 Assuming that you now
have a Bluetooth phone
in your hands, the first
thing to do is to make
sure that Bluetooth is
enabled. You will need
to read the handbook of
the particular phone (or
PDA etc) that you have
but somewhere in the
Menu item you will find
the item that enables and
How to Bluejack
 Your phone or PDA will start to search the airwaves for
other devices within range.
 If you are lucky you will see a list of them appear, or it
will say that it cannot find any.
 If the latter happens then relocate to another crowd or
wait a while and try again.
 If you have a list of found devices then let the fun begin.
The various steps involved – in mobile
 1. First press the 5-way joystick down.
 2. Then choose options.
 3. Then choose "New contact"
 4. Then in the first line choose your
desired message.
 5. Then press done.
 6. Then go to the contact.
 7. Then press options.
 8. Then scroll down to send.
 9. Then choose "Via Bluetooth"
 10. Then the phone will be searching for
enabled Devices.
 11. Then press "Select"
The various steps involved – in
computer/laptop
 1. Go to contacts in your
Address Book program (e.g.
Outlook)
 2. Create a new contact
 3. Enter the message into one of
the 'name' fields
 4. Save the new contact
 5. Go to the address book
 6. Right-click on the
message/contact
 7. Go to action
 8. Go to Send to Bluetooth
 9. Click on other
 10. Select a device from the list
Software Tools
 Bluespam: BlueSpam searches for all
discoverable Bluetooth devices and sends a
file to them (spams them) if they support
OBEX.
 Meeting point: Meeting point is the perfect
tools to search for Bluetooth devices.
Combine it with any bluejacking tools and
have lots of fun. This software is compatible
with pocket PC, Windows.
 Freejack: Freejack is compatible to java
phone like Nokia N-series
 Easyjacking (eJack): Allows sending of text
Messages to other Bluetooth enables
devices.
Usage of Bluejacking
 Bluejacking can be used in
many fields and for various
purposes like in the busy
shopping centre,train station
highstreet,cinema,café/restaura
nt/pubetc.
 The main use of bluejacking
tools or bluejacking is in
advertising purpose and
location based purpose.
 Experimental results show that
the system provides a viable
solution for realizing permission-
Now remember
that bluetooth works
only for short range of
distances, so you need to
find the crowd.
Bluejacking is very new
so the bigger crowd the
more likely you will find
a “victim” on the train,
in the cafe or standing
in line are all good
places to start……
Bluejackers often look for the receiving
phone to ping or the user to react. In
order to carry out a bluejacking,
the sending and receiving devices must be
within 10 meters of one another.
Related Concepts
 BlueSnarfing:
“Bluesnarfing” is the term
associated with downloading any
and all information from a
hacked device. Bluesnarfing is
the theft of information from a
wireless device through a
Bluetooth connection, often
between phones, desktops,
laptops, and PDAs. This allows
access to a calendar, contact list,
emails and text messages.
Bluesnarfing is much more
serious in relation to
Bluejacking
Related Concepts
Bluebugging:
Bluebugging is a form of
Bluetooth attack. In
progression of discovery
date, Bluetooth attack started
with bluejacking, then
bluesnarfing, and then
bluebugging. Bluebug
program allows the user to
take control of a victim's
phone to call the user's
phone. This means that the
Bluebug user can simply
How to Prevent Being
Bluejacked
To prevent being
Bluejacked, disable
Bluetooth on the
mobile device
when not in use.
The device will not
show up on a
“Bluejacker’s”
phone when he/she
attempts to send a
Good Practices for Bluetooth Enabled
Devices
Whether someone is unwilling to partake in Bluejacking
or just does not want to be bothered with these messages,
the following are some good practices to consider:
 Do not reveal an identity when either sending or receiving
Bluejacked messages.
 Never threaten anyone.
 Never send messages that can be considered abusive.
 Never reveal personal information in response to a
Bluejacked message.
 Disable Blue Tooth option if not in use in order to
prevent Bluejacked messages.
 If a Bluejacking message is received, delete the message
voice accepting it or it will be added to the device’s address
book.
Warning
• Never try to 'hack' a
device for the purpose
of copying or modifying
any files on any device
or upload any
executable files. By
hacking a device you are
committing an offence
under the computer
misuse act 1990, which
states it is an offence to
obtain unauthorized
Conclusion
 Bluejacking is a technique by which we can
interact with new people and has ability to
revolutionerise market by sending advertisement
about the product, enterprise etc. on the Bluetooth
configured mobile phone so that the people get
aware about them by seeing them on the phone.
Thank You
Safeguard Your Bluetooth
Mobile Phone
Any query…..??

Contenu connexe

Tendances (20)

Bluejacking
BluejackingBluejacking
Bluejacking
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
Bluejacking sadhana
Bluejacking sadhanaBluejacking sadhana
Bluejacking sadhana
 
Blue jacking mercy
Blue jacking mercyBlue jacking mercy
Blue jacking mercy
 
Bluejacking by Niharika Mundra
Bluejacking  by Niharika MundraBluejacking  by Niharika Mundra
Bluejacking by Niharika Mundra
 
bluejacking
bluejackingbluejacking
bluejacking
 
bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.ppt
 
Blue Jacking
Blue Jacking Blue Jacking
Blue Jacking
 
Blue Jacking
Blue JackingBlue Jacking
Blue Jacking
 
Bluejacking by krishna soni
Bluejacking by krishna soniBluejacking by krishna soni
Bluejacking by krishna soni
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Blue jacking
Blue jackingBlue jacking
Blue jacking
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
 
NFC
NFCNFC
NFC
 
NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2
 
NFC For Usability Professionals
NFC For Usability ProfessionalsNFC For Usability Professionals
NFC For Usability Professionals
 
What is nfc
What is nfcWhat is nfc
What is nfc
 

En vedette (14)

ERP
ERPERP
ERP
 
Field hockey
Field hockeyField hockey
Field hockey
 
Business Model for Broadcast Mobile TV
Business Model for Broadcast Mobile TVBusiness Model for Broadcast Mobile TV
Business Model for Broadcast Mobile TV
 
Hacking, Ciberguerra y otros Palabros
Hacking, Ciberguerra y otros PalabrosHacking, Ciberguerra y otros Palabros
Hacking, Ciberguerra y otros Palabros
 
History of field hockey
History of field hockeyHistory of field hockey
History of field hockey
 
Airborne Internet
Airborne InternetAirborne Internet
Airborne Internet
 
Hockey
HockeyHockey
Hockey
 
Airborne internet
Airborne internetAirborne internet
Airborne internet
 
Airborne internet-presentation(my)
Airborne internet-presentation(my)Airborne internet-presentation(my)
Airborne internet-presentation(my)
 
Airborne internet
Airborne internetAirborne internet
Airborne internet
 
Airborne Internet
Airborne InternetAirborne Internet
Airborne Internet
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
AIRBORNE
AIRBORNEAIRBORNE
AIRBORNE
 
Airborne Internet
Airborne InternetAirborne Internet
Airborne Internet
 

Similaire à Bluejacking

Bluetooth Attacks.docx
Bluetooth Attacks.docxBluetooth Attacks.docx
Bluetooth Attacks.docxShravani Patil
 
Bluetooth based-chatting-system-using-android-docx
Bluetooth based-chatting-system-using-android-docxBluetooth based-chatting-system-using-android-docx
Bluetooth based-chatting-system-using-android-docxshanofa sanu
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportROHIT SAGAR
 
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdfsmilichitti
 
Mobile Device Best Practices.pdf
Mobile Device Best Practices.pdfMobile Device Best Practices.pdf
Mobile Device Best Practices.pdfSherozkhan15
 
3 Blue Presentation
3 Blue Presentation3 Blue Presentation
3 Blue Presentationali100
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?acijjournal
 
Advocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online CourseAdvocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online CourseAdam Varn
 

Similaire à Bluejacking (14)

Bluetooth Attacks.docx
Bluetooth Attacks.docxBluetooth Attacks.docx
Bluetooth Attacks.docx
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
blue-JACKING.pptx
blue-JACKING.pptxblue-JACKING.pptx
blue-JACKING.pptx
 
Blue jacking
Blue jackingBlue jacking
Blue jacking
 
Bluetooth based-chatting-system-using-android-docx
Bluetooth based-chatting-system-using-android-docxBluetooth based-chatting-system-using-android-docx
Bluetooth based-chatting-system-using-android-docx
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
 
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
 
Bluejacking ppt.pptx
Bluejacking ppt.pptxBluejacking ppt.pptx
Bluejacking ppt.pptx
 
SEMINAR ON bluejackng
SEMINAR ON bluejackngSEMINAR ON bluejackng
SEMINAR ON bluejackng
 
Mobile Device Best Practices.pdf
Mobile Device Best Practices.pdfMobile Device Best Practices.pdf
Mobile Device Best Practices.pdf
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
3 Blue Presentation
3 Blue Presentation3 Blue Presentation
3 Blue Presentation
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
Advocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online CourseAdvocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online Course
 

Dernier

CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceanilsa9823
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Pooja Nehwal
 
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPsychicRuben LoveSpells
 
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...wyqazy
 
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝soniya singh
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7Pooja Nehwal
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceanilsa9823
 
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Niamh verma
 

Dernier (8)

CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
 
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
 
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
 
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
 
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
 

Bluejacking

  • 2. INTRODUCTION ORIGIN OF BLUEJACKING HOW TO BLUEJACK SOFTWARE TOOLS USES OF BLUEJACKING CODE OF ETHICS HOW TO PREVENT BEING BLUEJACKING WARNING CONCLUSION PRESENTATION CONTENTPRESENTATION CONTENT
  • 3. What is bluejacking  Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth- enabled devices such as mobile phones, PDAs or laptop computers,etc.  Bluetooth has a very limited range; usually around 10 meters on mobile phones, but laptops can reach up to 100 meters with powerful transmitters.
  • 4. Origin of Bluejacking  This bluejack phenomenon started after a Malaysian IT consultant named “Ajack” posted a comment on a mobile phone forum.  Ajack told IT Web that he used his Ericsson cellphone in a bank to send a message to someone with a Nokia 7650.  Ajack did a Bluetooth discovery to see if there was another Bluetooth device around. Discovering a Nokia 7650 in the vicinity, he created a new contact and filled in the first name with ‘Buy Ericsson!' and sent a business card to
  • 5. How to Bluejack  Assuming that you now have a Bluetooth phone in your hands, the first thing to do is to make sure that Bluetooth is enabled. You will need to read the handbook of the particular phone (or PDA etc) that you have but somewhere in the Menu item you will find the item that enables and
  • 6. How to Bluejack  Your phone or PDA will start to search the airwaves for other devices within range.  If you are lucky you will see a list of them appear, or it will say that it cannot find any.  If the latter happens then relocate to another crowd or wait a while and try again.  If you have a list of found devices then let the fun begin.
  • 7.
  • 8. The various steps involved – in mobile  1. First press the 5-way joystick down.  2. Then choose options.  3. Then choose "New contact"  4. Then in the first line choose your desired message.  5. Then press done.  6. Then go to the contact.  7. Then press options.  8. Then scroll down to send.  9. Then choose "Via Bluetooth"  10. Then the phone will be searching for enabled Devices.  11. Then press "Select"
  • 9. The various steps involved – in computer/laptop  1. Go to contacts in your Address Book program (e.g. Outlook)  2. Create a new contact  3. Enter the message into one of the 'name' fields  4. Save the new contact  5. Go to the address book  6. Right-click on the message/contact  7. Go to action  8. Go to Send to Bluetooth  9. Click on other  10. Select a device from the list
  • 10.
  • 11. Software Tools  Bluespam: BlueSpam searches for all discoverable Bluetooth devices and sends a file to them (spams them) if they support OBEX.  Meeting point: Meeting point is the perfect tools to search for Bluetooth devices. Combine it with any bluejacking tools and have lots of fun. This software is compatible with pocket PC, Windows.  Freejack: Freejack is compatible to java phone like Nokia N-series  Easyjacking (eJack): Allows sending of text Messages to other Bluetooth enables devices.
  • 12. Usage of Bluejacking  Bluejacking can be used in many fields and for various purposes like in the busy shopping centre,train station highstreet,cinema,café/restaura nt/pubetc.  The main use of bluejacking tools or bluejacking is in advertising purpose and location based purpose.  Experimental results show that the system provides a viable solution for realizing permission-
  • 13. Now remember that bluetooth works only for short range of distances, so you need to find the crowd. Bluejacking is very new so the bigger crowd the more likely you will find a “victim” on the train, in the cafe or standing in line are all good places to start……
  • 14. Bluejackers often look for the receiving phone to ping or the user to react. In order to carry out a bluejacking, the sending and receiving devices must be within 10 meters of one another.
  • 15. Related Concepts  BlueSnarfing: “Bluesnarfing” is the term associated with downloading any and all information from a hacked device. Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs. This allows access to a calendar, contact list, emails and text messages. Bluesnarfing is much more serious in relation to Bluejacking
  • 16. Related Concepts Bluebugging: Bluebugging is a form of Bluetooth attack. In progression of discovery date, Bluetooth attack started with bluejacking, then bluesnarfing, and then bluebugging. Bluebug program allows the user to take control of a victim's phone to call the user's phone. This means that the Bluebug user can simply
  • 17. How to Prevent Being Bluejacked To prevent being Bluejacked, disable Bluetooth on the mobile device when not in use. The device will not show up on a “Bluejacker’s” phone when he/she attempts to send a
  • 18. Good Practices for Bluetooth Enabled Devices Whether someone is unwilling to partake in Bluejacking or just does not want to be bothered with these messages, the following are some good practices to consider:  Do not reveal an identity when either sending or receiving Bluejacked messages.  Never threaten anyone.  Never send messages that can be considered abusive.  Never reveal personal information in response to a Bluejacked message.  Disable Blue Tooth option if not in use in order to prevent Bluejacked messages.  If a Bluejacking message is received, delete the message voice accepting it or it will be added to the device’s address book.
  • 19. Warning • Never try to 'hack' a device for the purpose of copying or modifying any files on any device or upload any executable files. By hacking a device you are committing an offence under the computer misuse act 1990, which states it is an offence to obtain unauthorized
  • 20. Conclusion  Bluejacking is a technique by which we can interact with new people and has ability to revolutionerise market by sending advertisement about the product, enterprise etc. on the Bluetooth configured mobile phone so that the people get aware about them by seeing them on the phone.
  • 21. Thank You Safeguard Your Bluetooth Mobile Phone Any query…..??