Excerpt From Bluetooth Vulnerabilities (Part 2) Webinar
Below, Find a Recap of CTO, Dr. Brett Walkenhorst’s Bluetooth Part 2 Webinar
Bluetooth is a complex spec. This short video provides a wrap up of what makes Bluetooth unique, incluing its architecture type, maturity level, and exploitation potential. Ultimately, Brett reminds us that historical threats are just as important as the emerging threats due to the lingering risk that they pose to present day security, and for their informative potential.
For more on Bluetooth:
- Bastille Webinar: Bluetooth Vulnerabilities Part 1
- Bastille Webinar: Bluetooth Vulnerabilities Part 2 (from this snippet)
- Bastille White Paper: Bluetooth Vulnerabilities