- 7 Apr 2011
blue is taken from Bluetooth, the technology bluejacking uses.
jacking is derived from both "ajack" and "hijacking"
Even thought bluejacking does not resemble hijacking There is no accessing or taking private data from your victim's device.
Bluejacking is totally limited to Bluetooth enabled devices.Bluetooth has a very limited range, usually around 10 metres on mobile phones, but laptops and other instrument with high power transmitters can reach up to 100 meters.
“Bluejacking” is define as sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs, Laptops, sending a contact which typically contains a message in the name field to another bluetooth enabled device via the OBEX protocol.
Few prople say the term “Bluejacking” originated with a user named ajack on esato.com. Some people say that the term bluejacking comes from Bluetooth and hijacking. While that certainly sounds logical, a bluejacker doesn't hijack anything, he just send a contact to the recipient's device. Both parties have absolute control over their devices, and a bluejacker will not be able to take control of your phone or steal your personal information.
You can create a phonebook contact and write a message, eg. 'Hello, you've been bluejacked', in the 'Name' field. Then you can search for other phones with Bluetooth and send that phonebook contact to them. On their phone, a message will popup saying "'Hello, you've been bluejacked' has just been received by Bluetooth" or something along those lines. For most 'victims' they will have no idea as to how the message appeared on their phone. So, personalised messages like 'I like your pink top' and the startled expressions that result is where the fun really starts.
Bluejacking is quite harmless, but because bluejacked people don't know what is happening, they think their phone is malfunctioning. Usually, a bluejacker will only send a text message, but with modern phones it's possible to send images or sounds as well.
But with the increase in the availability of bluetooth enabled devices, these devices have become vulnarable to virus attacks and even complete take over of devices through a trojan horse program.