This document discusses bluejacking, which is sending unsolicited messages to Bluetooth devices. It provides an introduction to bluejacking and Bluetooth technology. The history of bluejacking is explained, originating from a comment on a mobile forum. Steps for bluejacking using mobile phones and computers are outlined. The document also lists software tools for bluejacking and common locations where it occurs. Potential harm from bluejacking and prevention methods are briefly mentioned before concluding.
History
 This
bluejack phenomenonstarted after a Malaysian
IT consultant named “ Ajack ” posted a comment on
a mobile phone forum.
 Ajack told IT Web that he used his Ericsson
cellphone in a bank to send a message to someone
with a Nokia 7650. Becoming bored while standing
in a bank queue Overview.
On mobile
 Go
toContacts.
 Create a new contact.
 Write the short note in name.
 Save this contact.
 Select this contact and send via Bluetooth.
 Your phone will search for devices
 All the Bluetooth devices near you will be displayed.
 Select any one you like and send.
 You have bluejacked someone.
8.
On Personal computer/Laptop
Go
to contacts in your Address Book program (e.g.
Outlook).
 Create a new contact.
 Enter the message into one of the 'name' fields.
 Save the new contact.
 Go to the address book.
 Right-click on the message/contact.
 Go to action
 Go to Send to Bluetooth
 Click on other
 Select a device from the list and double click on it
Places where bluejackingoccurs
Home
Cafés
Bars
Restaurants
Places where bluejack
occures
Stores ans shopping malls
Public transportation
0
5
10
15
20
25
30
35
Prevention
 There
is hardlyany software available to prevent or
detect bluejacking.
 Turn off bluetooth
 Don’t put device in discoverable and conectable
mode
14.
Conclusion
Low cost andpower consumption technology.
 It may have great future if it should follow codes
ethics.