Attacks & Threats
Bluejacking
Also known as: Bluetooth message spam
Definition
A largely nuisance-level Bluetooth attack in which an attacker sends unsolicited messages or contacts to nearby discoverable Bluetooth devices.
Examples
- Sending a vCard with a provocative "name" to phones discoverable on a train or in a shopping mall.
- Pushing a fake "You won a prize" contact card to phones in a café as a phishing pretext.
Related terms
Bluesnarfing
An attack that exploits Bluetooth vulnerabilities to read or copy data — contacts, messages, calendar entries, files — from a nearby device without the owner's consent.
Bluebugging
A Bluetooth attack that gains hidden, command-level control of a victim device — beyond passive data theft — to place calls, read messages, or relay audio.
Social Engineering
The psychological manipulation of people into performing actions or disclosing confidential information that benefits an attacker.
Smishing
Phishing delivered via SMS or other mobile-messaging channels to trick victims into clicking malicious links, calling fraudulent numbers, or revealing data.
Evil Twin Attack
A Wi-Fi attack in which an adversary stands up a rogue access point that mimics a legitimate SSID, so victims connect to it and expose traffic or credentials.
Rogue Access Point
An unauthorised wireless access point connected to a network, either installed maliciously by an attacker or naively by an employee, that bypasses network security controls.