Skip to main content
Microsoft 365
March 29, 2024

What is bluejacking?

Bluetooth technology is commonly used by smartphone owners to connect to speakers, laptops, and other devices. Unfortunately, Bluetooth isn’t immune to hacking attempts and scams, including a scam called bluejacking. Learn what bluejacking is and how to prevent Bluetooth attacks with these safety tips.

A person scrolling through their phone

The definition of bluejacking

Bluejacking is a technique that involves sending unsolicited messages over Bluetooth to mobile phones, speakers, or laptops. The word “bluejacking” comes from the combination of the words “Bluetooth” and “hijacking.” While it sounds serious, a bluejacking attack is usually just a minor annoyance that doesn’t result in any damage or data loss. Bluejacking attacks have even been used in guerilla marketing campaigns to place ads on people’s devices.

Is bluejacking dangerous?

While receiving unsolicited messages in a bluejacking attack can be frightening, the attacker doesn’t have access to your personal data and can’t take control of your device beyond sending messages. In addition, many hackers avoid Bluetooth attacks, as they require proximity to their target and increase the risk of getting caught.

Microsoft Defender Banner
Microsoft 365 Logo

Microsoft Defender

Stay safer online with one easy-to-use app1

1Microsoft 365 Personal or Family subscription required; app available as separate download

Learn More

However, bluejacking can be dangerous in certain situations. Some bluejacking scams involve sending phishing messages, which encourage viewers to open unsafe links or download malware onto their devices.

Bluejacking versus bluesnarfing

Bluejacking and bluesnarfing are two different forms of cyber threats that both involve Bluetooth. While bluejacking is typically an annoying prank, bluesnarfing is a more serious attack that involves accessing your data through an unauthorized Bluetooth connection. In addition, bluesnarfing can lead to serious privacy breaches, as attackers can access personal information, contacts, emails, photos, and other data.

“Bluejacking is a technique that involves sending unsolicited messages over Bluetooth to mobile phones, speakers, or laptops.”

Bluejacking versus bluebugging

Developed after bluejacking and bluesnarfing, bluebugging is a type of Bluetooth attack that allows attackers to access someone’s phone without their knowledge. This is more serious than a bluejacking attack, as it can lead to malicious activities like eavesdropping on calls and sending messages without consent. The best way to protect your phone from bluejacking, bluebugging, and bluesnarfing is by using your Bluetooth wisely and following best practices.

How to protect against bluejacking

Protect your device from a Bluetooth attack with these safety tips:

  • Turn off your Bluetooth. The easiest way to prevent a bluejacking attack is by turning off your Bluetooth when you aren’t using it.
  • Set your device to “non-discoverable” mode. This means that your device won’t show up when someone else is searching for Bluetooth devices.
  • Only accept Bluetooth connections from devices you trust. Decline any pairing requests from unknown devices.
  • Learn the names of your devices. This can help you avoid accidentally connecting to the wrong device.
  • Change the default PIN on your device. Regularly change the default PIN on your device to prevent unauthorized access.

While bluejacking is generally more of an annoyance than a serious security threat, it’s important to be aware of it and take steps to protect your device. By understanding what bluejacking is and how it works, you can help keep your device safe from potential attacks. Learn more about other types of digital attacks like wardriving attacks or smishing attacks to help you stay safe.

Get started with Microsoft 365

It’s the Office you know, plus the tools to help you work better together, so you can get more done—anytime, anywhere.

Buy Now

Topics in this article

Microsoft 365 Word, Excel, PowerPoint, Outlook, OneDrive, and Family Safety Apps
Microsoft 365 Logo

Everything you need to achieve more in less time

Get powerful productivity and security apps with Microsoft 365

Buy Now

Explore Other Categories