You may have heard references to one or more of these terms in emails from friends or conversations with the IT pros in your company. Here’s a quick rundown for your reference:
Bluejacking: Also known as Bluetooth spam, anonymous “business cards” sent via Bluetooth to discoverable devices in range.Bluebugging: Allows hackers to access mobile phone commands (AT commands) via Bluetooth, allowing access to SMS (Short Message Service), phonebook, call sending, and eavesdropping. Older, first-generation Bluetooth phones are the most susceptible to this kind of attack.
Bluesnarfing: Allows access to data on a Bluetooth-enabled phone. Data at risk in a Bluesnarf attack includes the calendar, phonebook, and IMEI (International Mobile Equipment Identity). Bluesnarfing affects mostly Nokia and Sony Ericcson phones.
Denial of Service (DoS): Constant requests for response from Bluetooth. It causes excess battery drain and temporary blockage of Bluetooth access by peripherals. There’s no real risk; it’s just extremely annoying.Interception: Use of a specially made Bluetooth device to interrupt paired devices. A device will request repairing while disguised as previously paired device and intercept the PIN entered, allowing access to cell phone or PDA.
Cabir Worm: Self-replicating malicious software that spreads via Bluetooth. The worm only affects Bluetooth-enabled phones using the Symbian Series 60 User Interface Platform. A user must manually accept the worm for infection to take place.