Excerpt From Bluetooth Vulnerabilities (Part 1) Webinar
Find Out More About What You Can Do To Defend Against Bluetooth Monitoring Attacks
CTO, Dr. Brett Walkenhorst, talks on how increased Bluetooth inquiry and scan request packets can be a sign of questionable activity on behalf of an attacker. Defenders can identify and pinpoint such dangers by actively keeping an eye out for such activity, which gives them important information about the whereabouts and identity of attackers. While active monitoring has its advantages, certain security monitoring in Bluetooth networks may be passive and less readily deployable for defense.
Bluetooth Monitoring – What Can You Do? — Bastille
For more on Bluetooth:
- Bastille Webinar: Bluetooth Vulnerabilities Part 1 (from this snippet)
- Bastille Webinar: Bluetooth Vulnerabilities Part 2
- Bastille White Paper: Bluetooth Vulnerabilities