Video Hub
Video

Bluetooth Session Hijacking

Excerpt From Bluetooth Vulnerabilities (Part 1) Webinar
Find out more about Bluetooth Session Hijacking Presented by CTO, Dr. Brett Walkenhorst
Attackers employ complex strategies to jam peripheral devices, which leads to a timeout and connection loss on the central device, giving the attacker access to take control of it. The term “window widening,” is a Bluetooth protocol feature that an attacker could use to control one side of a connection. Discover more about the use of tools that cause these attacks in this clip, which highlights the importance of awareness and diligence in Bluetooth security procedures

Close your cybersecurity gaps with AI-driven wireless visibility

See Bastille in action with a live demo from our experts in wireless threat detection.