Excerpt From Bluetooth Vulnerabilities (Part 2) Webinar
Below, Find a Recap of CTO, Dr. Brett Walkenhorst’s Bluetooth Part 2 Webinar
Bluetooth is a complex spec. This short video provides a wrap up of what makes Bluetooth unique, incluing its architecture type, maturity level, and exploitation potential. Ultimately, Brett reminds us that historical threats are just as important as the emerging threats due to the lingering risk that they pose to present day security, and for their informative potential.
UPCOMING REPORT: The Need for Wireless Airspace Defense
Get early access