Join our CTO, Brett Walkenhorst, Ph.D., for the latest event in our Vulnerability Series, “Bluetooth Vulnerabilities – Part 2.”
Watch this webinar to learn more about the Bluetooth protocol and its related vulnerabilities. With the steady increase in the everyday prevalence of both Bluetooth and BLE, the breadth of potential threat vectors also increases.
In this webinar our Brett will discuss the following threat categories as they relate to Bluetooth:
Keystroke Injection
Pairing Attacks
Paired Attacks
Implementation Flaws
PLUS a showcase of some the new features in the latest version of Bastille for Bluetooth and other protocols
Speaker:
Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech