5. 1. BLUEJACKING:
Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices
such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a
message in the name field (i.e., for bluedating or bluechat) to another Bluetooth-enabled device
via the OBEX protocol.
6. 2. BLUESNARFING
Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection.
Bluetooth is a high-speed but very short-range wireless technology for exchanging data between
desktop and mobile computers, personal digital assistants (PDAs), and other devices.
7. 3. BLUEBUGGING
Bluebugging is a form of Bluetooth attack often caused by a lack of awareness.
It was developed after the onset of bluejacking and bluesnarfing.
8. PREVENTION
• There is hardly any software available to prevent or detect blue-T-
attacks.
• Turn off Bluetooth.
• Update your device on regular basis.
• Change password when you come to know somting wrong happening
to your device.
9. CONCLUSION
• Low cost and power consumption technology.
• It may have great future if it should follow codes ethics.
Reference:
website search: www.wikipedia.org
Photos: Google images
Book: Faster_Ankit Fadia
10. You might can’t catch the pickpocket,
but you can stop the thief.