A name given to individuals when they are in an exchange using the Bluetooth wireless technology.
Bluejacking occurs for a short time when one literally hijacks another personÂ’s
cell phone by sending it an anonymous text message using the Bluetooth Âwireless
networking system. Many in the hacker
community see bluejackers as merry prankstersÂ—Âplacing them in the grey zone
between the White Hats and the Black Hats. For example, a published
story about bluejacking describes how a group of tourists were strolling
through Stockholm and admiring handicrafts in a storefront window when one of
their cell phones beeped and displayed an anonymous message saying, Â“Try the
blue sweaters. They keep you warm in the winter.Â” Obviously, the latter event
was a harmless incident of bluejacking. More serious attacks are easily
conceivable, particularly when data is stolen from cell phones and used in identity theft
Black Hats; Hacker; Identity Theft or Masquerading; White Hats or Ethical
Hackers or Samurai Hackers.
Jellyellie. BluejackQ with a Q. [Online, 2004.] Jellyellie Website. http://
www.bluejackq.com/talkthetalk.asp; McFedries, P. Technically Speaking: Hacking
Unplugged. IEEE Spectrum, February
2004, p. 80.