Explain the following terms: BlueBugging, BlueSnarfing & Bluejacking Bluebugging: Bluebugging attacking is targeted for privacy issues that are specific to cell phones and Bluetooth headsets. In order to succeed, bluebugging needs skilled hackers with knowledge of Bluetooth privacy protection and protocols. The hacker gains the access to a cellular phone’s commands and persisted information. A number of functions are performed by the hacker while in control of the cell phone. Typical functions are:
a. access, add or delete contact lists b. connect the cell phone to the Internet c. download ringtones, images d. make phone calls
Bluesnarfing: Bluesnarfing are attacks which are more serious issues of privacy than bluejacking. It describes the unauthorized access to the utilization of information on a Bluetooth device, which includes cell phones, computer systems and PDAs. The information includes the text messages, calendar schedules, address books, emails, pictures and also videos. The best privacy protection against bluesnarfing is setting Bluetooth device to “non-discoverable”.
Bluejacking: A least damaging Bluetooth privacy issues. It could cause great annoyance to users. Bluejacking allows other user of mobile phones for sending business cards to other people’s phones anonymously. Usually, bluejacking is a prank. It may be able to transmit Trojan viruses.
|