-
What is bluejacking
Hi all,
I have read about it on the web; heard about it on the radio; read articles in the newspapers.. but what exactly is bluejacking? I can assure you that you'll be sick of the word 'Bluetooth'. Any idea. Please suggest. Thanks in advance.
-
What is bluejacking
Bluejacking that use Bluetooth wireless technology, mobile phone users to send business cards anonymously behavior. Bluejacking "no" will be removed from the device or modify any data. These cards typically include a number of naughty or provocative messages, not known as the name and phone number. Bluejacker usually look through the phone or the ping response to the user, then they will send more other personal information to the device. All the best.
-
Re: What is bluejacking
The need for bluejacking, sending and receiving devices must be between the distance within 10 meters. Phone machine message received bluejack main should refuse to add these contacts to the Address Book. Set the device non-discoverable mode are not vulnerable to attacks like bluejacking. check and reply.
-
What is bluejacking
Bluetooth-enabled mobile phones are also becoming targets those who steal personal information. Bluetooth cell phone a few years ago when available, its security Loophole already mentioned. Security firm AL Digital communications security personnel once the computer through a design Program, Scanning BluetoothPhone transmission band, and its vulnerability to bypass the password holder to obtain the goal of the telephone communications in the contact information and the picture information. That all works from bluejacking.
-
What is bluejacking
Bluetooth mobile phone security holes caused by mobile phone manufacturers have not paid enough attention, leading to its high technology Pick pockets use. Currently, some attacks can not invite to connect the phone via Bluetooth, send anonymous information; or Remote Bluetooth-enabled cell phone intercept, that all information on mobile phone exposure in the face of the attacker. In the industry, both acts are called "Bluejacking", "copy attack." All the best.
Tags for this Thread
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
Page generated in 1,711,625,193.78694 seconds with 16 queries
Bookmarks