BlueBugging, BlueSnarfing & Bluejacking - Bluetooth

Explain the following terms: BlueBugging, BlueSnarfing & Bluejacking

Bluebugging:
Bluebugging attacking is targeted for privacy issues that are specific to cell phones and Bluetooth headsets. In order to succeed, bluebugging needs skilled hackers with knowledge of Bluetooth privacy protection and protocols. The hacker gains the access to a cellular phone’s commands and persisted information. A number of functions are performed by the hacker while in control of the cell phone. Typical functions are:

a. access, add or delete contact lists
b. connect the cell phone to the Internet
c. download ringtones, images
d. make phone calls

Bluesnarfing:
Bluesnarfing are attacks which are more serious issues of privacy than bluejacking. It describes the unauthorized access to the utilization of information on a Bluetooth device, which includes cell phones, computer systems and PDAs. The information includes the text messages, calendar schedules, address books, emails, pictures and also videos. The best privacy protection against bluesnarfing is setting Bluetooth device to “non-discoverable”.

Bluejacking:
A least damaging Bluetooth privacy issues. It could cause great annoyance to users. Bluejacking allows other user of mobile phones for sending business cards to other people’s phones anonymously. Usually, bluejacking is a prank. It may be able to transmit Trojan viruses.
Bluetooth vs Infrared
Bluetooth vs Infrared - The following are the differences between Bluetooth and Infrared....
What is Cabir Worm? - Bluetooth
What is Cabir Worm? - A Cabir worm is one of the malicious software, usually referred as malware. It utilizes Bluetooth technology.....
Differences between Bluetooth and Wi-Fi
Bluetooth and Wi-Fi - Bluetooth technology is to replace cables, while Wi-Fi is utilized for providing wireless, high-speed access to the Internet...
Post your comment