Resources Webinar

Webinar: Vulnerability Series – Bluetooth Vulnerabilities – Part 2

 

Join our CTO, Brett Walkenhorst, Ph.D., for the latest event in our Vulnerability Series, “Bluetooth Vulnerabilities – Part 2.”

Watch this webinar to learn more about the Bluetooth protocol and its related vulnerabilities. With the steady increase in the everyday prevalence of both Bluetooth and BLE, the breadth of potential threat vectors also increases.

In this webinar our Brett will discuss the following threat categories as they relate to Bluetooth:

Keystroke Injection

Pairing Attacks

Paired Attacks

Implementation Flaws

PLUS a showcase of some the new features in the latest version of Bastille for Bluetooth and other protocols

Speaker:

Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

We’d love to show you around

Learn how Bastille can help you prepare you for today’s ever-growing wireless threat landscape, and schedule a demo and we’ll be in touch shortly.