Results 1 to 5 of 5

Thread: What is bluejacking

  1. #1
    Join Date
    Feb 2010
    Posts
    678

    What is bluejacking

    Hi all,

    I have read about it on the web; heard about it on the radio; read articles in the newspapers.. but what exactly is bluejacking? I can assure you that you'll be sick of the word 'Bluetooth'. Any idea. Please suggest. Thanks in advance.

  2. #2
    Join Date
    Jan 2006
    Posts
    3,792

    What is bluejacking

    Bluejacking that use Bluetooth wireless technology, mobile phone users to send business cards anonymously behavior. Bluejacking "no" will be removed from the device or modify any data. These cards typically include a number of naughty or provocative messages, not known as the name and phone number. Bluejacker usually look through the phone or the ping response to the user, then they will send more other personal information to the device. All the best.

  3. #3
    Join Date
    Jan 2006
    Posts
    4,221

    Re: What is bluejacking

    The need for bluejacking, sending and receiving devices must be between the distance within 10 meters. Phone machine message received bluejack main should refuse to add these contacts to the Address Book. Set the device non-discoverable mode are not vulnerable to attacks like bluejacking. check and reply.

  4. #4
    Join Date
    Apr 2008
    Posts
    3,339

    What is bluejacking

    Bluetooth-enabled mobile phones are also becoming targets those who steal personal information. Bluetooth cell phone a few years ago when available, its security Loophole already mentioned. Security firm AL Digital communications security personnel once the computer through a design Program, Scanning BluetoothPhone transmission band, and its vulnerability to bypass the password holder to obtain the goal of the telephone communications in the contact information and the picture information. That all works from bluejacking.

  5. #5
    Join Date
    May 2008
    Posts
    3,516

    What is bluejacking

    Bluetooth mobile phone security holes caused by mobile phone manufacturers have not paid enough attention, leading to its high technology Pick pockets use. Currently, some attacks can not invite to connect the phone via Bluetooth, send anonymous information; or Remote Bluetooth-enabled cell phone intercept, that all information on mobile phone exposure in the face of the attacker. In the industry, both acts are called "Bluejacking", "copy attack." All the best.

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,711,625,193.78694 seconds with 16 queries