Like us on Facebook

Download AVG PC Tuneup full version for free

Friends in the previous post we have given you BITDEFENDER Total Security 2012 Full version key....
In this post im going to post u how to get AVG PC tuneup software for free !!
AVG PC tuneup is the best software to improve your computer performance !!
The normal cost of this software is $34.99 per year. This is the special offer for our blog viewers, Get this software full version for freeee in this blog :) :) !!

AVG PC Tuneup has many features such as "Speedp ur internet speed, Disk fragmentation, Disk repair, etc
You also have the feature for recovering the files which you have deleted accidentally.
Download it from here : AVG PC tuneup Trial version
Procedure To converst it into full version :
1) First download the trial version product.
2) After downloading, open the setup and complete the whole process.
3) And then open the file, and it will ask u "Purchase Full version" and "Continue". Above that u will find "I already have a product key"
4) Click on "I already have a product key".
5) It will ask u to enter the product key.
6) There you enter 00002G-3Z9G15-31KFDH-CN1TE9-UM­­896M-Q90Y37-PGBN9A-EZYBAH-1Q8­2QC-VMDUB4-T15M3B .
Your product will be converted now into full version.
Note: while entering product key, type it manually. When you copy and paste the code it will automatically put "-" in random spots.. copy and paste that code into the registry prompt and then search for any -'s that separate the key from having groups of 6 letters/digits. 
-If this code is not working, contact us @ technoblik@gmail.com, we will send u a new product code.
ENJOY !! :)

BitDefender Total Security 2012 with Valid and Genuine license key

Fed up by spending money to buy antivirus ??
Dont worry....!!
We've got a Bumper offer for viewers of TECHNO-BLIK..... ;)
Get your free BITDEFENDER Total Security 2012 (The ultimate Silent Security) which is the top 1 antivirus in the world. 





Key-Features of Bitdefender Total security 2012:
  • Blocks viruses, spyware & spam
  • Halts ID theft attempts
  • Filters the links you receive from your Facebook and Twitter friends
  • Keeps kids safe with cutting-edge parental controls
  • Online backup
  • Tunes up your PC for optimal speed & performance









We are posting Genuine Licensed key for BITDEFENDER Total security 2012 in this blog, Install nd keep ur computer secured ;)

BitDefender Total Security 2012 Working keys :
1) XMR3RWW
2) 8FE2F56786009B332EA9
3) C04F924DF7FEB215C364

Procedure to Install:
1) Click Here to download Bitdefender total securiity 2012.
2) Then register yourselves for Bitdefender Website with your own email id.
3) You will get a link to your email about the download.
4) Click that link, and BD total security will be downloaded.
Note: First Trail version will be downloaded, after providing the key any of the above it will be converted into full version.
5) Enter the key and Complete the whole process.
6) And thn bitdefender is installed on your computer. 
 Enjoy.....
keep visiting Our blog for many many more Bumper Offers :) :)

Sony- Rolly (A new generation dancing player)

The compact white-colored egg-shaped gizmo could easily fit in your palms and can rotate, flap its ends, and flash colorful lights in time to music.
Want to experience a dancing player - well Sony makes it possible. 



  • Sony has unveiled the all-new 'Rolly' digital music player that rotates, flaps its ends, and flashes colorful lights in time to music. 
  • The compact white-colored egg-shaped gizmo could easily fit in your palms. Weighing 300 g and measuring 104 mm long and 65 mm in circumference, Rolly has speakers on each end that are hidden by dish-like covers. 




  • There's only 1 button on the player - an on/off switch. The other functions are controlled by a pair of rings that circle its body. 
  • While 1 ring is used to move from track to track or album to album, the other controls the volume. These rings are connected to motors that enable the Rolly to scoot around a table-top in tune to the music being played. 
  • The player can stand 5 hours of audio playback. This drops to 4 hours when the device is in motion and 3 and a half hours when Bluetooth streaming is also enabled. 




  • Rolly has 1 GB of internal flash memory and can playback MP3, Atrac, or AAC songs (AAC songs with copy protection from iTunes Music Store aren't supported). It can also receive music streamed via a Bluetooth connection. 
  • With a storage capacity of around 600 songs (depending on the songs' audio quality and length) Rolly incorporates sensors that could identify which way is up, enabling volume to be controlled by turning the player clockwise or anti-clockwise and tunes to be switched by pushing or pulling it on the floor. 




  • Users have the choice of either using a special program on a PC, which analyzes music to come up with simple choreography that appears to match the rhythm of the songs, or download packaged moves to tunes from a Sony website. 
  • Sony's Rolly will be launched across Japan by September 29 this year and will be available for Rs 14,380 (40,000 yen/US$354). 
  • However, Indian customers still have to wait long since Sony is yet to decide plans for an international launch.


Police crackdown on fake shopping sites



More than 2,000 web shops selling fake or non-existent goods have been shut down by police.
Goods purportedly from GHD, Ugg, Tiffany and Nike had been peddled by the sites, said the Metropolitan Police E-Crime Unit.

It said shoppers had been tempted by low prices.
The unit warned that the goods supplied were counterfeit, adding that many sites had taken payment and then not despatched any products in return.

It said many of the sites had been simply set up by cyber thieves to harvest credit card and banking details.

Precautions :
Police officers worked with domain registrars to identify the rogue traders and then used Nominet's powers to seize and shut down the offending domains.

Detective Inspector Paul Hoare from the E-Crime Unit said many gangs registered sites in bulk solely to dupe customers. He said the campaign to close the criminal sites would continue in the run-up to Christmas.

"I would urge customers to take all precautions to ensure they buy from legitimate sites only," he said.

DI Hoare said consumers should check a website's credentials to ensure it was approved and reputable. He said they should also consider using a credit card for payments over £100 and perhaps reserve one card for online shopping.

DI Hoare said shoppers should also be wary of unsolicited offers that arrive via email.

The E-Crime Unit took similar action in 2010 when it shut down about 1,800 sites.

A simple method to get the Youtube new design before official release..!!


Not only gmail nd google homepage, google is also testing a brand new design for Youtube and here's a little hack you can do right-now to enjoy the swanky new layout before official release.


All New Youtube Homepage:


New Youtube Design:



To get started with the new YouTube design follow the steps below :

  • Launch www.youtube.com in Morzilla Firefox or Google Chrome.
  • If using Firefox press : Ctrl+Shift+K and if Google Chrome : Ctrl+Shift+J to open developer Tools.
  • In the developer tools console paste document.cookie="VISITOR_INFO1_LIVE=ST1Ti53r4fU"; and hit enter.
  • Reload Youtube Website and enjoy the new layout.

Google Music is LIVE

The search giant has finally entered the cloud music arena by launching first invitation only public beta of their "Google Music" service, unfortunately the service is only available to US users but the limitation can be easily bypassed as shown after the jump along with Google Music features, beta invitation process and a video demonstration.

Google Music Beta Features :

  • Listen anywhere, even offline - You can get to your personal music collection at home or on the go. Listen from the web or any enabled device with the Music app available from Android Market. Not online? No problem. The songs you've recently played will automatically be available offline. You can also select the specific albums, artists and playlists you want to have available when you're not connected.
  • Stay in sync, without the hassle - Spend more time listening to your music and less time managing it. Once your music is online, it's always available. Playlists are automatically kept in sync, and you don't have to worry about cables, file transfers, or running out of storage space.
  • Your collection, now in one place - Upload your personal music collection to a single library, even if it's scattered across multiple computers. You can upload music files from any folder or add your iTunes® library and all of your playlists. And when you add new music to your computer, it can be automatically added to your music collection online.
  • Mix it up - Create your own custom playlists with just a few clicks. Or use Instant Mix to automatically build new playlists of songs from your collection that go great together. All the playlists you create and all the changes you make to them are automatically available everywhere your music is.
How to get an Google Music Beta invitation :

  • Goto Google Music Beta page and click "Request an Invitation >" button.
  • If you are not from US, you will be shown an error message as posted below - in this case continue using a US proxy site like www.hidemyass.com to access the page.
  • Once the page loads-up Sign-in using your Google account credentials.
  • Confirm the request.
  • You will now be notified when your number comes for the invite.
Visit : Google Music World Tour


India to get Apple iPhone 4S Offcially From Nov. 25th, 2011, Pre-order Bookings Open Now


Want to buy the latest Apple iPhone 4S in India via the legal and official channel?, your wait is over as two major Indian cell-carriers Airtel and Aircel have revealed the official availability dates and prices for iPhone 4S in India. Priced at Rs 44,500 for 16GB and Rs 50,900 for 32 GB model (no 64 GB availability for now) the phone is available for pre-order right now and will be retailed from 25 November 2011.


Many of them can have a doubt that "can SIRI understands the Indian accent ?" Just have a look at the video below.


Links to pre-order I-Phone 4S officially in India:
Airtel
Aircel 

5 Tips to secure your Facebook account

Facebook is one of the top accessed website in the world and most popular social networking website. I'm sure many of you who are reading this, must be spending hours of time everyday on Facebook.

Nothing could be worse than losing your own Facebook account or some one getting access to your Facebook account and misusing it.

But now that there are reports of Facebook accounts being hacked I'm sharing five tips which will help you to keep your Facebook login safe and secure.

1. Enable HTTPS login:
Recently Facebook brought HTTPS enabled login and this is first step to your Facebook account settings > security. To enable this feature, go to edit account settings and under account security enable secure browsing (In older version of facebook). And in new version it is simple, just click on "Secure Browsing" as shown in above pic and mark on "Browse Facebook on a secure connection (https) when possible"

2. Facebook device login

This is one of the best feature which will make sure that you will get notified whenever your account is compromised. Whenever your account will be logged in from a new device, you will be receiving an email for the same. To enable this feature, go to account settings > Account security and enable features which says 'When a new computer or mobile device logs into this account'(In older version of facebook). And in new version it is simple, just click on "Login Notifications" as shown in above pic and mark on "Email/Text message/Both".

3. Strong and complex password
 One simple way to get into someone's account is by using hit and trial method for password. Brute force are usually useless these days because of complex security measures taken by Facebook. But if I know you as an individual, I may try to try couple of passwords like your girlfriend's name, your birth date and so on. Most of the time this works. If you wish to be secure your Facebook and other account, you should try using a complex password. More over by changing your password every month and using different password for different account will surely help.

4. Keeping your computer secure

The first place which hackers will target will always be your computer. We have already shared how to keep yourself safe and secure while surfing internet. But let me repeat myself once again, you should be keeping your OS up to date along with Antivirus. If you are tech savvy, I would recommend using any firewall (Comodo is one which I use and recommend) and a Trojan remover.

5. Avoid Facebook spam applications


If you are active user on Facebook, you must have seen spam in the form of Facebook applications like Mark Zuckerberg official announcement and so on. Try not to use any Facebook application if you have not read its review. These days most of such spam applications will spam your friend wall, will ask you to fill a survey or else they will add random people into your account. You can go to application setting page and see which all applications have access to your Facebook account. Disable those which you are not using.
Obviously  there are more tips which will help you to keep yourself safe and secure but following above five you will lower down the possibilities of losing your Facebook account to hackers.



Facebook accounts being Hacked

The recent Facebook hack has reportedly claimed over 2 lakh victims in Bangalore. According to a news report in Mid Day, some two lakh Facebook users in Bangalore had their accounts hacked and weblinks to their morphed pornographic pictures sent as feeds to friends and family.
Quoting social networking analysts, the report says that more than 2 lakh Bangalore Facebook accounts were hacked. The cybercrime department too is reported to have received calls and complaints regarding the mass hacking.
According to the report, there are around 50 posts on Facebook stating that the users are quitting the social networking site forever after being embarrassed before friends and family.
 Incidentally, according to a Bloomberg report, Facebook claimed that it has identified those responsible for the deluge of hardcore porn and violent images in some users' newsfeeds, and said it is working with its legal team "to ensure appropriate consequences follow."
The social networking company made the statement after porn, pictures of extreme violence and faked photos of celebrities such as Justin Bieber in sexual situations had overrun the profiles of some Facebook users.
Facebook said that it has "drastically limited the damage caused" by a spam attack that took advantage of a browser vulnerability. "Protecting the people who use Facebook from spam and malicious content is a top priority for us," Palo Alto, California-based Facebook said in a statement.
Users were tricked into pasting malware into their browsers, which in turn resulted in the sharing of offensive content, Facebook said.
According to Facebook, no user data or accounts were compromised during the attack.
Meantime, Facebook warned users to never cut and paste unknown code into a browser's address bar, and to always use an up-to-date browser, as well as to flag and report any suspicious content.




Nokia Asha Series|Asha 200|Asha 201|Asha 300|Asha 303|Price Review

NOKIA ASHA  200 :

Nokia ASHA 200 comes packed with 2.4 inches LCD screen that supports bright colors and 320×240 pixels resolution. The phone has its own 10 MB internal memory and there will not be a problem of storage it has its external microSD card slot that expansion by up to 32 GB. Connectivity options of gadget include EDGE/GPRS, Bluetooth with EDR, USB connector, HTML browser and social networking freaks that access to multiple sites like facebook, orkut and many more. For entertainment and other multimedia features FM radio with recording, multi format audio/video player, games and 2 mega pixels of camera option that will able to capture a good quality images. The 1430 mAh battery is providing a talk time up to 7 hours and approx 37 days on standby.

Nokia Asha 200 Review, Features and Specifications

  • Network Band: GSM/EDGE 900/1800 MHz
  • SIM Type: Dual SIM Dual Standby
  • Camera Size: 2.0 mega pixels
  • Display Screen Size: 2.4 inches
  • Display Resolution: 320 × 240 pixels
  • Internet Connectivity: GPRS and EDGE
  • Data Transfer connectivity: Bluetooth v2.1 with EDR (no A2DP), micro USB connector
  • 3.5 mm audio connector jack
  • Nokia Messaging Mail & Chat 3.2
  • Social Network integrated (Communities) 2.0 – Facebook and Orkut
  • Nokia Store and Nokia Browser
  • Video recording in QCIF (10fps)
  • Video format support: MPEG4 and 3GPP
  • Audio format support: MP3, AAC and eAAC+
  • Stereo FM radio
  • FM Radio with recording and Song Capture
  • Loud Speaker (106 phon)
  • Recording UI integrated with Radio player
  • Inside the mobile box
  • Nokia Battery BL-5J
  • Nokia Charger AC-11
  • Nokia Stereo Headset WH-102
  • Customizable home screens
  • Internal Memory: Up to 10 MB
  • Expandable Memory: Supports up to 32 GB
  • microSD card Slot (hot swappable)
  • Battery Model: Nokia Battery BL-5J (1430 mAh)
  • Music playback backup: up to 52 hours
  • Talk time: up to 7 hours
  • Standby time: up to 37 days on single SIM and up to 23 days on dual SIM
  • Dimensions: 115.4 x 61.1 x 14.0 mm
  • Weight: 105 grams
PRICE OF NOKIA ASHA 200 IN INDIA: 
Nokia MRP      :Rs 4,759 INR
Naaptol Price :Rs 4,539 INR 
LetsBuy Price :Rs 4,449 INR
Flipkart Price :Rs 4,370 INR
NOKIA ASHA 201 : 
Nokia is launching another ASHA series mobile phone called Nokia ASHA 201. This is a single SIM mobile phone rather ASHA 200 is DUAL SIM compatible mobile phone and works on GSM/EDGE dual band networks. Nokia 201 has same features of previous ASHA 200 mobile phone and comes with additional features. The dimensions of the phone are same as Nokia ASHA 200, measure about 115.4x61.1x14.0 mm and weight 105 gram. The phone is running on Symbian S40 operating system and has 2.4 inches of LCD display that support the 320 × 240 pixels of resolutions. 

Nokia Asha 201 has 2 Mega Pixels cameras that come along with digital zoom for capturing a decent quality images and videos of memorable moments. The GPRS is available for connecting to internet and user will access the social networking freaks like facebook, orkut, yahoo & windows live messenger, Google talk and ovi chat. Both nokia ASHA 200 & 201 has a same memory capacity. It has 10 MB internal memory and also expands up to 32 GB through external memory card slot. Other options are Bluetooth, USB port, FM radio with recording and multi format support audio player.

Nokia Asha 201 review, features and specifications
  • Network band: Dual band GSM/EDGE
  • Operating system: Symbian S40
  • QWERTY keyboard
  • Flash Lite support
  • Display screen size: 2.4 inches
  • Display resolution: 320 × 240 pixels
  • Display Type: TFT resistive touchscreen
  • Display Colors: 256K colors
  • Camera Size: 2.0 mega pixels
  • Camera Resolution: 1600×1200 pixels
  • Video recording 176×144@10fps
  • Internet connectivity: EDGE and GPRS
  • Data Transfer connectivity: Bluetooth v2.1 with EDR (no A2DP)
  • micro USB connector
  • 3.5 mm audio connector jack
  • Nokia Store
  • Nokia Browser
  • Communications
  • Email client supporting Gmail™, Yahoo® Mail, Hotmail, Ovi Mail and others
  • Chat application with support for Windows Live Messenger™, Yahoo!® Messenger, Google Talk™ and Ovi Chat from Nokia
  • Social networking integrated: Facebook and Orkut
  • Video Format Support: MPEG4 and 3GPP
  • Audio format Support: MP3, AAC and eAAC+
  • Stereo FM radio with FM recording
  • Song Capture support with FM Radio
  • Recording UI integrated with Radio player
  • Nokia Stereo Headset WH-102
  • Nokia Charger AC-11
  • Loudspeaker phone
  • SMS(threaded view), MMS, Email, IM
  • Internal Memory: up to 10 MB
  • Expandable memory: supports up to 32 GB
  • Battery Model: Nokia Battery 1430 mAh BL-5J
  • Talk time: up to 7 hours
  • Standby time: up to 37 days
  • Audio playback backup: up to 52 hours
  • Dimensions: 115.4 x 61.1 x 14.0 mm
  • Weight: 105 grams
Coming Soon....!!!
>>>>PRICE OF NOKIA ASHA 201 IN INDIA is not available and will be Updated soon............
NOKIA ASHA 300 :

Nokia Asha 300 price in India. Nokia ASHA also includes a series of smart phones. Nokia has launching Nokia Asha 300 smart phone with latest lists of specifications. 1 GHz of processor is powering gadget with 128 MB RAM & 256 MB ROM so as to offer good performance and has a wide 2.4 inches of TFT touch screen that capability of 256k colors with 240 x 320 pixels of resolutions. The display has a feature of auto turn off proximity sensor and touch restive screen. On messaging user will able to send MMS, push Email and instant messaging. For the convenience of the users there is variety of internet and device connectivity options includes 3G HSDPA, EGDE, GPRS, Bluetooth and USB port. The Wi-Fi option is not available on this phone. 

Nokia Asha 300 has comes packed with 5 mega pixels camera with 2592 x 1944 pixels of resolutions and video recording has a capability of VGA 30 fps. The phone has a 140 MB internal storage capacity and user will also expand the memory up to 32 GB through external memory card slot. Lists of another specifications of cell phone has multi format audio video player and 1110 mAh Li-ion battery that promising of good power backup up to 597 hours on standby mode.

Nokia Asha 300 review, Features and Specifications


  • Network Band: 2G GSM 850 / 900 / 1800 / 1900, 3G HSDPA 850 / 900 / 1900 / 2100
  • Processor Power: 1GHz
  • Display Screen Size: 2.4 inches
  • Display Resolution: 240 x 320 pixels
  • Camera Size: 5.0 Mega Pixels
  • Camera Resolution: 2592 x 1944 pixels
  • Fixed focus
  • Video recording: VGA@30fps
  • Flash Lite support
  • Display type: TFT resistive touch screen
  • Display Colors: 256K colors
  • Proximity sensor for auto turn-off
  • Messaging: SMS(threaded view), MMS, Email, Push Email, IM
  • Internal Memory: 140 MB with 256 MB ROM and 128 MB RAM
  • Expandable memory: supports up to 32GB
  • microSD Card slot
  • Internet Connectivity: GPRS and EDGE, 3G HSDPA, 10.2 Mbps; HSUPA, 2 Mbps
  • Data Transfer Connectivity: Bluetooth v2.1 with A2DP, EDR, microUSB v2.0, HS
  • Battery Model: Li-Ion 1110 mAh (BL-4U)
  • Stand by: Up to 550 hours on 2G / 597 hours on 3G
  • Talk time: Up to 6 h 54 min on 2G / 4 hours 18 min on 3G
  • Audio Playback backup: Up to 28 hours
Coming Soon....!!
>>>>PRICE OF NOKIA ASHA 300 IN INDIA is not available and will be Updated soon............
 NOKIA ASHA 303 :
A QWERTY-equipped feature phone, the Nokia Asha 303 also comes with a capacitive touchscreen and a price tag that makes this device look very interesting indeed.
The Asha 303 is a bit of an oddity, as are several other recent low-cost Nokia devices. Although this isn't a smartphone, it really pushes the limits of what plain old "feature phones" can do. It packs a relatively small 2.6" 240 x 320 pixel touch sensitive display, it has a 1GHz processor inside, and a 3.2 megapixel camera on the back, an FM radio, a media player and a microSD slot plus Bluetooth. This is a 3.5G capable device with WiFi support as well, which is pretty impressive when you consider that it will cost just €115 before tax and subsidy.
This is a Series 40 device, which means that it is nowhere near as flexible as a smartphone when it comes to available software, but it can still download Java applications and perhaps most importantly of all, it comes with a pre-installed version of Angry Birds Lite.
Also included is a web browser, instant messaging client, a set of social networking applications and broad email support. Most markets will have a version of Nokia Maps too, although the Asha 303 does not support GPS.

Although this is an elegantly designed handset with a good feature set, if you can stretch your budget by about 50% you could get a low-end Android phone which would include GPS, have a bigger touchscreen and access to thousands of applications from the Android Market. On the other hand, the Asha 303 is likely to be a much faster device to use.
The Asha 303 measures 117 x 56 x 14mm and weighs just 97 grams. The relatively large 1300 mAh battery can power the 303 for up to 7 hours talktime and 35 days standby time on 3G.
Nokia say that the Asha 303 should be available during Q4 2011 in red, green, purple, aqua, silver white and graphite colours.
 Nokia Asha 303 review, Features and Specifications :
Available:
Q4 2011
Network:
GSM 850 / 900 / 1800 / 1900 +
UMTS 850 / 900 / 1700 / 1900 / 2100
Data:
GPRS + EDGE + UMTS (3G) + HSPA + WiFi
Screen:
2.6" 240 x 320 pixels, 262k colours
Camera:
3.2 megapixels
Size:
Medium monoblock
117 x 56 x 14mm / 97 grams
Bluetooth:
Yes
Memory card:
MicroSD
Infra-red:
No
Polyphonic:
Yes
Java:
Yes
GPS:
No
OS:
Series 40
Battery life:
7 hours talk / 35 days standby (3G)
Coming Soon...!!>>>>PRICE OF NOKIA ASHA 300 IN INDIA is not available and will be Updated soon............
































Types Of Bluetooth Hacks And Its Security Issues


Bluetooth came up as one of the major breakthroughs in close range wireless transfer of data and communication standard between mobile devices. Although the GSM standard itself is a wireless standard operating on licensed bands, yet transfer of large amount of data is not feasible especially if you want to share a file may be with your friend near by. Mobiles did have the Infrared technology which was used for such applications.


But to use it, infrared lenses of both the mobiles had to be within the line of sight. Infrared also became popular for playing two player games, but once again all such applications with Infrared don’t offer the feature of mobility which is the purpose of having a mobile in the first place.
The Bluetooth technology solved this issue and we can now do all this stuff we did with Infrared using unlicensed band of radio waves without having to be in line of sight. Therefore this major issue with Infared can now be addressed without compromising user mobility.
Bluetooth has become a very basic feature of mobiles and now every mobile be it from a branded vendor or to may be a Chinese clone of such mobiles; all have this feature embedded in them. Many Bluetooth application therefore have emerged that allow peering of users, however people least give importance to the security issues that arise when radio spectrum is used in such a way.
Although using unlicensed band has its benefits to the end user but being under no regulation it is more vulnerable to security issues. A typical user sharing a file with a friend would be least concerned about the security threats, using Bluetooth can cause. However if an individual’s mobile is compromised, the hacker can have easy access to personal data and can even manipulate it, which might concern him too.
Here lets take a look into the different categories of how hackers can infiltrate user’s mobile using Bluetooth, then we will discuss their mechanism briefly to make the end user aware of how vulnerable he can be.



Categories of bluetooth hacking

Bluetooth hacks are categorized broadly among:
  1. Bluejacking
  2. Bluesnarfing
  3. Bluebugging
  4. Bluetoothing
  • Firstly let’s take a look into Bluejacking. In Bluejacking a hacker might send unsolicited messages to the victim in the form of a business card or a mobile contact with a text that may look intimidating to read. In many cases hacker may also send sounds like a ring tone. The victim’s mobile could then be infiltrated and he might never know what has hit him. Bluejacking messages can also be viewed as spam messages with emails. There have also been reports about people getting hacked by Trojan Horse’s which could mean a serious compromise.
  • Bluesnarfing is considered a serious compromise in the category of Bluetooth hacking especially if the information vulnerable, is quite critical, as such attacks can allow the hacker access to victims; contact list, text messages, emails and even private photos and videos. The hacker can use brute force attack even if the device is invisible to guess the victims MAC address.
  • The third type of hacking mechanism is Bluebugging, in which the hacker uses sophisticated attacks to gain control of victims mobile. It works just like Trojan horses, where the hacker can manipulate the users phone the way he desires by executing commands on the victims phone. The hacker could forward mobile calls from the victim’s mobile to his own device and can even manipulate the mobile to follow a Bluetooth headset instructions like; receive call, send messages etc.
  • The final type is Bluetoothing which is just like social engineering; the hacker can use methods like harassment or luring the victim to fall his prey to his intentions.



The Tool Mostly Used For Bluetooth Hacking

Bluetooth technology didn’t just come out randomly for hobbyist to play with. It was a joint venture of top mobile companies just like the Wi-fi alliance. Therefore security fixes are often made in the form of firmware updates, by these companies when ever a threat emerges.
However like with most security vulnerabilities it is also important that the end user be educated as people don’t know what they are allowing or running in their cell phones. Hackers create tools from time to time to compromise such vulnerable mobiles.
One such tool is Super Bluetooth Hack which demonstrates characteristics of both Bluesnarfing and Bluebugging. This Bluetooth hack is one of the most widely used and is used by both professional hackers as well as people who just want to have fun by sneaking into other's mobiles, without even knowing about the security issues that may arise in doing so.

Security Issues With Super Bluetooth hack

Super Bluetooth hack is a typical small 270KB Java application that runs on mobile environment. It can cause great damage by gathering victim’s personal information as discussed in the hacking categories earlier. It is not an authentication-bypass tool that could use brute-force or back door attack, but it uses method of social engineering to hack into victim’s mobile.
Following are some of the key threats posed by this tool:
  • The hacker can bypass pairing by sending a download file which if the victim accepts; he might give him access to his personal data. In another method the hacker might establish one time pairing to intervene into the victim’s mobile by physically accessing his phone. Therefore the end user must be aware of such attacks as it is one of the most common and simplest method used my hackers.
  • The hacker could get access to the victim’s call register and he might place a call, put them on hold or hang-up. The victim might think that there is an issue in the phone however in reality his phone is compromised by an infiltrator.
  • This tool can make the victim’s mobile extremely vulnerable as the hacker issues desired commands on the victim’s phone and can even get data to his device, by bypassing any authentication mechanism. This shows how lethal such tools can be which are readily available on the web. Thus we must be responsible of protecting our mobiles too by taking necessary precautions.


Precautions

All these hacks have been mentioned just to inform the bluetooth users how vulnerable there devices can be. Currently no such major software has been developed to stop the above methods of hacking however newer devices are built taking into account these threats and experts believe that they will prove to be more secure. Regardless of all this, there are always some precautions that can be taken i.e.
Always keep Bluetooth off when you are not using it and make sure you are pairing with known devices when ever you need too. Make sure you rename the mobile to something more generic too you, else the default name which is the model of the mobile will be displayed. Another important thing which you must have with you not just regards to Bluetooth but mobile security in general is your mobile PIN, which you can use too reset you phone to default factory settings.
These are some basic but necessary precautionary measures which you can take to protect your phone privacy. Bluetooth like most technologies is meant to benefit us but we should know how to use it safely to protect us from their side effects too!