bluejacking takes advantage of a loophole in the technology's messaging options that allows a user to send unsolicited messages to other nearby Bluetooth owners.
a bluejacker will most likely camp out in crowded areas like shopping malls, airports and subway systems to find victims places with a potentially high percentage of people with Bluetooth-enabled devices
Bluetooth technology operates by using low-power radio waves, communicating on a frequency of 2.45 gigahertz.
This special frequency is also known as the ISM band, an open, unlicensed band set aside for industrial, scientific and medical devices. When a number of Bluetooth devices are switched on in the same area they all share the same ISM band and can locate and communicate with each other, much like a pair of walkie talkies tuned to the same frequency are able to link up
Bluetooth technology users take advantage of this ability to network with other phones
and can send text messages or electronic business cards to each other. To send information to another party, the user creates a personal contact name in his or her phone's address book This is know as BlueJacking....
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment