, which requires the interaction of the victim, bluesnarf does not need any computer program to access the mobile.
A practice called bluejacking
similarly pushes text or pictures to other Bluetooth devices.
With Bluesnarfing, also called Bluejacking
, hackers use a laptop which scans to find Bluetooth-compatible phones which can then be targeted.
The latest mobile phone craze takes a dollop of networking technology, a slice of email, adds a chunk of mischief, and wraps it all up in a new concept called 'bluejacking
relies on the fact that hundreds of people have purchasedBluetooth-capable mobiles without realising what Bluetooth is for,and have left the feature switchedon, not knowing that doing so makes their phones into a target.
It also opens up Bluejacking
to your computer people can send you contacts with embedded messages using Bluetooth gadgetry.