Webinar

Webinar: Vulnerability Series – Bluetooth Vulnerabilities – Part 2

Join our CTO, Brett Walkenhorst, Ph.D., for the latest event in our Vulnerability Series, “Bluetooth Vulnerabilities – Part 2.”

Watch this webinar to learn more about the Bluetooth protocol and its related vulnerabilities. With the steady increase in the everyday prevalence of both Bluetooth and BLE, the breadth of potential threat vectors also increases.

In this webinar our Brett will discuss the following threat categories as they relate to Bluetooth:

Keystroke Injection

Pairing Attacks

Paired Attacks

Implementation Flaws

PLUS a showcase of some the new features in the latest version of Bastille for Bluetooth and other protocols

Speaker:

Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

 

Close your cybersecurity gaps with AI-driven wireless visibility

See Bastille in action with a live demo from our experts in wireless threat detection.