Bluejacking is the unauthorized sending of messages from one Bluetooth device to another. Bluetooth is a high-speed, short-range wireless technology for exchanging data between laptops, smartphones, smartwatches, etc. This sort of technology is called ‘Near Field Communications‘, or NFCs. Bluetooth has a very short range (approximately 10m), meaning a bluejacker and their Bluetooth-enabled device must be near you for bluejacking to work.
Bluejacking often involves sending unsolicited business cards, messages, or pictures to other users in your vicinity such as on a subway or train. An example of a documented situation of this happening is a ‘woman being targeted with 120 images on public transport via AirDrop‘. The Huffington Post commented on the story about this woman having been ‘cyber-flashed’ with a flock of more than 100 down-the-pants images via AirDrop while traveling on the London Underground.
There’s no need to be discoverable to other users all the time.
If you’re in a private place with a sender you trust, it’s probably OK, but if you’re in a busy coffee shop or shopping mall, remember that Everyone mode opens you up to everyone else around.
It is very easy to connect to the wrong phone using Bluetooth and AirDrop when you’re in a crowded place such as a stadium or shopping mall. Resist the urge to connect blindly when you run across that old friend in one of these places and wish to share a few pictures. Check the name and proceed carefully.
In IOS, co to Settings > General > Software Update.
Oftentimes users are under the false pretense that Apple products are secure, virus-free, and are never exploited. It’s critical to be aware that vulnerabilities exist in all devices and to follow the advice above by turning things off when not in use. Read CyberHoot’s ‘Malware in Macs‘ article to learn more about Mac’s vulnerabilities.
Sources:
Additional Reading:
Woman Targeted With 120 Images Via AirDrop
Related Terms:
Apple Wireless Direct Link (AWDL)
Near Field Communications (NFC)
Radio Frequency Identification (RFID)
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
Stop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...
Read moreA recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.