UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 4 | April 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 7 Issue 5
May-2020
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2005390


Registration ID:
233415

Page Number

561-565

Share This Article


Jetir RMS

Title

Bluejacking: Its Overview, Process Of Bluejacking And Preventive Measures

Authors

Abstract

Bluejacking is probably the most common form of Bluetooth hacking. This happens when a hacker searches for discoverable devices in the area and then sends spam in the form of text messages to the devices. This form of hacking is rather childish and harmless.It was once used mainly to prank people in the past when mobile devices came with Bluetooth that was automatically set to discoverable. Bluejacking is used today for spam messaging and the hackers who use this do it just to frustrate others. The method does not give hackers access to your phone or the information on it.Bluejacking involves Bluetooth users sending messages to other Bluetooth users within range. Although sensitive information may not be revealed, unwanted messages may show up on your device.

Key Words

Hijack, OBEX, bluesnarfing, Wi-Fi, PDA.

Cite This Article

"Bluejacking: Its Overview, Process Of Bluejacking And Preventive Measures", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.7, Issue 5, page no.561-565, May-2020, Available :http://www.jetir.org/papers/JETIR2005390.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Bluejacking: Its Overview, Process Of Bluejacking And Preventive Measures", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.7, Issue 5, page no. pp561-565, May-2020, Available at : http://www.jetir.org/papers/JETIR2005390.pdf

Publication Details

Published Paper ID: JETIR2005390
Registration ID: 233415
Published In: Volume 7 | Issue 5 | Year May-2020
DOI (Digital Object Identifier):
Page No: 561-565
Country: LUDHIANA, PUNJAB, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0003284

Print This Page

Current Call For Paper

Jetir RMS