Dr. Bob Baxley, CTO and Head of the Bastille Threat Research Team examines how hackers can use recently disclosed Bluetooth and Bluetooth Low Energy (BLE) vulnerabilities to bypass your security, gain access to your systems, and exfiltrate data and voice information. Using research from the Bastille Threat Research team as well as analysis of data from the National Vulnerability Database, Dr. Baxley will examine 8 Recent Bluetooth and BLE Device Attacks.
Presenter: Dr. Baxley is CTO, Bastille and former Director of the Software Defined Radio Lab at Georgia Tech (bio here).
Recent Bluetooth and Bluetooth Low Energy Attacks, which:
- Affect Billions of Devices
- Allow Hackers to use RF as a Vector for Cybercrime
- Affect All Networks and Locations
- Impact the Devices we use Everyday
- Disrupt our Networks, Buildings and National Infrastructure
- How to use Radio Frequency (RF) detection and location technologies to:
- Detect, Locate and Isolate Devices Vulnerable to Attack
- Integrate Radio Frequency for Bluetooth and BLE security into your Security Infrastructure
- Geofence Sensitive Areas and Receive Alerts
- Conduct Forensic Analysis of Threats
- Tag Devices by Manufacturer
Speaker:
Dr. Bob Baxley, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech