Spam Via Bluetooth? That's What's NextSpam Via Bluetooth? That's What's Next
First there was <a href="http://www.techweb.com/encyclopedia/defineterm.jhtml;jsessionid=S1HBRP1PQUDXMQSNDLPCKH0CJUNN2JVN?term=spam">spam</a>. Then there was <a href="http://www.techweb.com/encyclopedia/defineterm.jhtml;jsessionid=S1HBRP1PQUDXMQSNDLPCKH0CJUNN2JVN?term=SPIM">spim</a>, which was followed by BlueJacking. Now there's <a href="http://www.mulliner.org/bluetooth/bluespamfaq.php">Bluespam</a>. That would be spam advertisements sent to your mobile phone via Bluetooth. What annoyances wil
October 18, 2007

First there was spam. Then there was spim, which was followed by BlueJacking. Now there's Bluespam. That would be spam advertisements sent to your mobile phone via Bluetooth. What annoyances will we have to deal with next?Is every medium, every surface, every screen, every iota of matter a legitimate place to advertise? That appears to be the case.
I remember the first piece of spam I received in my inbox. I was an AOL customer then, and the message promised me an easier time finding a...mate...if only I would click on the link and go to the Web site. I didn't fall for it then, and I don't now. Why spammers--and now Bluespammers--think sending advertisements directly to my mobile phone via its Bluetooth radio will get them any further, I couldn't tell you. Ads attached to text or picture messages are bad enough. But for ads to randomly appear on my phone every time I walk past a vending machine? That might be a bit much. But the legislators in the UK don't seem to think so. Specifically: The Information Commissioners Office removed Bluetooth from its list of communication media that require opt-in permission for advertisers, meaning Bluetooth-delivered touts will be treated differently from e-mail. Unwanted messages are unwanted messages, no matter the medium. I surely hope the U.S. legislature is as tough on Bluespam as it is on regular spam.
About the Author(s)
You May Also Like
Unlocking Maximum Productivity: AI-Powered Document Redaction & GenAI Innovation
Aug 30, 2023Evolution in ITSM: Navigating the New Horizon
Sep 12, 2023Cloud Crisis Management
Aug 30, 2023[Virtual Event] DevSecOps Essentials That Enable Efficient Security
Sep 14, 2023The State of Data Security and Management: Practical Tips for Building Cyber Resilience Strategies for IT and Security Leaders
Sep 25, 2023