• Home
  • Bit Index AI Site
  • Anonymity
    • How-to
    • Anonymity News
  • Security
    • How-to
    • Security News
  • Privacy
    • How-to
    • Privacy News
  • Linux
    • HowTo
    • Linux News
    • Tips and tricks
  • Store
    • Anonymity in Digital Era
    • Encryption in Everyday Life
    • Privacy in Digital Era
  • About
    Digital Era Anonymity | Security | Privacy
    • Home
    • Bit Index AI Site
    • Anonymity
      • How-to
      • Anonymity News
    • Security
      • How-to
      • Security News
    • Privacy
      • How-to
      • Privacy News
    • Linux
      • HowTo
      • Linux News
      • Tips and tricks
    • Store
      • Anonymity in Digital Era
      • Encryption in Everyday Life
      • Privacy in Digital Era
    • About

    Bluejacking

    September 16, 2013September 20, 2013 Richard

     Bluejacking.

    Threats

    Threats

    Bluejacking uses the Bluetooth technology but it is not as serious as Bluesnarfing. What it does is it will connect to your Bluetooth device and send some message to another Bluetooth device. It is not something damaging to your privacy or device system compared to the Bluesnarfing threat.

     

    Related

    Security computer security threat, Security Threat, Security Threats. permalink.

    Post navigation

    Bluesnarfing
    DDoS
    Logging In...

    Leave a Reply Cancel reply

    Anti Surveillance Material

    •  Privacy in Digital Era
    •  Encryption in Everyday Life
    •  Anonymity in Digital Era
    •   Store

               

    Top Posts & Pages

    • 10 Things To Do After Installing Ubuntu 14.04 Trusty Tahr To Get A Near Perfect Desktop
    • Install Popcorn Time In Ubuntu Or Debian Via PPA Repository
      Install Popcorn Time In Ubuntu Or Debian Via PPA Repository
    • Academics Find Critical Flaws in Self-Encrypting Hardware Drives
      Academics Find Critical Flaws in Self-Encrypting Hardware Drives
    • Using tiger for security audit and intrusion detection!
      Using tiger for security audit and intrusion detection!
    • GNU Privacy Assistant for GPG (Gnu Privacy Guard)
      GNU Privacy Assistant for GPG (Gnu Privacy Guard)
    • Comparing file systems -- ZFS and Btrfs
      Comparing file systems -- ZFS and Btrfs
    • Advantages and benefits of ZFS and Btrfs over ext4
      Advantages and benefits of ZFS and Btrfs over ext4
    • Fitbit Vulnerability Means Your Tracker Could Spread Malware
      Fitbit Vulnerability Means Your Tracker Could Spread Malware
    • Encryption in Everyday Life
      Encryption in Everyday Life
    • Microsoft Revokes Trust for Certificates Leaked by D-Link
      Microsoft Revokes Trust for Certificates Leaked by D-Link

    Similar Posts

    • Bluesnarfing
    • Computer Security Threats!
    • Dialer
    • Fake AV
    • DHS Raises Privacy Concerns With Senate Cyber Threat Sharing Bill
    • Adware
    • iOS 8 Will Randomize MAC Addresses to Help Stop Tracking
    • Research Shows Increase in Internet Filtering and Usage of FireChat App in Iraq

    Recent Posts

    • Facebook Says It Fixed A Bug That Caused Silent Audio To Vampire Your iPhone Battery October 21, 2015
    • You Can Now Tie Your Twitter And Vine Profiles Together, Vine Displaying Your Total Loops October 21, 2015
    • Novel NTP Attacks Roll Back Time October 21, 2015
    • Twitter Hints That It May Re-Enable Politwoops, The Service That Tracks Politicians’ Deleted Tweets October 21, 2015
    • Ubuntu 15.10 (Wily Werewolf) Ready For Download October 21, 2015
    • Instagram’s New Standalone App Boomerang Captures 1-Second Video Loops October 21, 2015
    • Custom Google App Engine Tweak Still Leads to Java Sandbox Escapes October 21, 2015
    • Shyp Overhauls Its Look, And Brand, With A Big App Update October 21, 2015
    • Apple Patches Include iOS 9.1 Update, Pangu Jailbreak Fix October 20, 2015
    • Fitbit Vulnerability Means Your Tracker Could Spread Malware October 20, 2015
    • Twitter Announces New Tools, Partnerships For Finding And Publishing Embedded Tweets October 20, 2015
    • Twitter To Let Brands Link Up Users’ Twitter Handles With Their Customer Accounts For Customer Care October 20, 2015
    • Twitter Introduces Gnip Insights APIs To Help Brands Better Understand Audiences And Content October 20, 2015
    • YouTube Will Completely Remove Videos Of Creators Who Don’t Sign Its Red Subscription Deal October 20, 2015
    • Google Moving Gmail to Strict DMARC Implementation October 20, 2015

    Categories

    • Anonymity
    • Cli
    • News
    • Privacy
    • Security
    • Tips and tricks

    Anti Surveillance Material

    • Privacy in Digital Era
    • Encryption in Everyday Life
    • Anonymity in Digital Era
    • Find us:

      Digital Era All rights reserved.