Bluejacking allows phone users to send business cards anonymously using Bluetooth wireless technology. Bluejacking does not involve the removal or alteration of any data from the device. These business cards often have a clever or flirtatious message rather than the typical name and phone number. Bluejackers often look for the receiving phone to ping or the user to react. They then send another, more personal message to that device. Once again, in order to carry out a bluejacking, the sending and receiving devices must be within 10 meters of one another. Phone owners who receive bluejack messages should refuse to add the contacts to their address book. Devices that are set in non-discoverable mode are not susceptible to bluejacking. [Source: Bluetooth wireless technology Hacking Information]
Bluejacking
Updated on:

Vangie Beal
Vangie Beal is a freelance business and technology writer covering Internet technologies and online business since the late '90s.
Related Articles
@ Sign
Pronounced at sign or simply as at, this symbol is used in e-mail addressing to separate the user' name from the user's domain name,...
Munging
(MUHN-jing) Munging (address munging), is the act of altering an email address posted on a Web page to make it unreadable to bots and...
How to Create an RSS Feed
In the second installment of RSS how-to, we look at some of the nonrequired (optional) channel and item tags, discuss RSS specifications in-depth and...
Dictionary Attack
(n.) (1) A method used to break security systems, specifically password-based security systems, in which the attacker systematically tests all possible passwords beginning with...
Definitions
ScalaHosting
ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...
Development
HRIS
Human resources information system (HRIS) solutions help businesses manage multiple facets of their...
Definitions
Best Managed Service Providers...
In today's business world, managed services are more critical than ever. They can...