Excerpt From Bluetooth Vulnerabilities (Part 1) Webinar
Find out more about Bluetooth Session Hijacking Presented by CTO, Dr. Brett Walkenhorst
Attackers employ complex strategies to jam peripheral devices, which leads to a timeout and connection loss on the central device, giving the attacker access to take control of it. The term “window widening,” is a Bluetooth protocol feature that an attacker could use to control one side of a connection. Discover more about the use of tools that cause these attacks in this clip, which highlights the importance of awareness and diligence in Bluetooth security procedures
UPCOMING REPORT: The Need for Wireless Airspace Defense
Get early access