Have you ever been doorbell ditching before? The point of the prank is simple: Sneak up to someone's front door, knock loudly or ring the doorbell, and, instead of greeting whoever answers the door, run away and hide somewhere nearby. The joy of doorbell ditching is, of course, reveling in the homeowner's confusion and rolling with laughter under the security of his nicely trimmed bushes. Although the game might get you in a bit of trouble if you happen to incite the ire of a cranky neighbor, it's mostly a harmless joke on par with a prank phone call. For more technically inclined pranksters with access to Bluetooth technology, however, there's the digital version of doorbell ditching and prank phone calls: Bluejacking. A kind of practical joke played out between Bluetooth -enabled devices, bluejacking takes advantage of a loophole in the technology's messaging options that allows a user to send unsolicited messages to other nearby Bluetooth owners.
|Published (Last):||19 August 2004|
|PDF File Size:||11.28 Mb|
|ePub File Size:||20.70 Mb|
|Price:||Free* [*Free Regsitration Required]|
Bluejacking exploits a basic Bluetooth feature that allows devices to send messages to contacts within range. Bluejacking does not involve device hijacking, despite what the name implies. The bluejacker may send only unsolicited messages. At worst, bluejacking is an annoyance. Bluesnarfing and bluebugging, however, are actual attacks that may result in a user losing control of his device. Although bluejacking, bluesnarfing and bluebugging use Bluetooth as the point of entry, bluesnarfing and bluebugging are far more harmful.
Bluejacking can be prevented by setting a device to hidden, invisible or non-discoverable mode. Toggle navigation Menu.
Home Dictionary Tags Security. Bluejacking Last Updated: February 13, Definition - What does Bluejacking mean? Bluejacking is a hacking method that allows an individual to send anonymous messages to Bluetooth-enabled devices within a certain radius. First, the hacker scans his surroundings with a Bluetooth-enabled device, searching for other devices. The hacker then sends an unsolicited message to the detected devices. Bluejacking is also known as bluehacking.
Techopedia explains Bluejacking Bluejacking exploits a basic Bluetooth feature that allows devices to send messages to contacts within range.
Share this:. Related Terms. Related Articles. Could Your Smartphone Be Hacked? The Truth About Cybersecurity. Related Questions. What is the difference between cloud computing and virtualization? What is the difference between cloud computing and web hosting? What is Cloud Print and how is it used? More of your questions answered by our Experts.
Related Tags. Security Wireless Networking Telephony Hacking. Synonyms: Bluehacking. Machine Learning and Why It Matters:. Latest Articles.
Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs personal digital assistant. Both Bluesnarfing and Bluejacking exploit others' Bluetooth connections without their knowledge. While Bluejacking is essentially harmless as it only transmits data to the target device, Bluesnarfing is the theft of information from the target device. Current mobile software generally must allow a connection using a temporary state initiated by the user in order to be 'paired' with another device to copy content. There seem to have been, in the past, available reports of phones being Bluesnarfed without pairing being explicitly allowed. After the disclosure of this vulnerability, vendors of mobile phone patched their Bluetooth implementations and, at the time of writing [ when? Any device with its Bluetooth connection turned on and set to "discoverable" able to be found by other Bluetooth devices in range may be susceptible to Bluejacking and possibly to Bluesnarfing if there is a vulnerability in the vendor's software.
Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones , PDAs or laptop computers , sending a vCard which typically contains a message in the name field i. Bluetooth has a very limited range, usually around 10 metres Bluejacking was reportedly first carried out between and by a Malaysian IT consultant who used his phone to advertise Ericsson to a single Nokia phone owner in a Malaysian bank. Jacking is, however, an extremely common shortening of "hijack', the act of taking over something. Another user on the forum claims earlier discovery,  reporting a near-identical story to that attributed to Ajack , except they describe bluejacking 44 Nokia phones instead of one, and the location is a garage, seemingly in Denmark , rather than a Malaysian Bank. Also, the message was an insult to Nokia owners rather than a Sony Ericsson advertisement. Bluejacking is usually harmless, but because bluejacked people generally don't know what has happened, they may think that their phone is malfunctioning.
Bluejacking allows phone users to send business cards anonymously using Bluetooth wireless technology. Bluejacking does not involve the removal or alteration of any data from the device. These business cards often have a clever or flirtatious message rather than the typical name and phone number. Bluejackers often look for the receiving phone to ping or the user to react. They then send another, more personal message to that device. Once again, in order to carry out a bluejacking, the sending and receiving devices must be within 10 meters of one another. Phone owners who receive bluejack messages should refuse to add the contacts to their address book.
What is bluejacking?
Bluejacking exploits a basic Bluetooth feature that allows devices to send messages to contacts within range. Bluejacking does not involve device hijacking, despite what the name implies. The bluejacker may send only unsolicited messages. At worst, bluejacking is an annoyance. Bluesnarfing and bluebugging, however, are actual attacks that may result in a user losing control of his device.