Emerging Tech: Security — The Need for Wireless Airspace Defense
Download nowEmerging Tech: Security — The Need for Wireless Airspace Defense
Download nowEmerging Tech: Security — The Need for Wireless Airspace Defense
Download nowSafeguarding Classified National Security (CNSI) from the Threats Posed by Personal or Portable Electronic Devices Within SCIFs and SAPFs
Read moreVideos
Wireless threats visually explained and demonstrated.
Webinars
Live or recorded online presentations or workshops
Whitepapers
Authoritative reports on complex threats
Datasheets
Explore key features, specifications, and benefits
Blog
Collection of articles with security insights
Support
Access our world-class assistance
Excerpt From Bluetooth Vulnerabilities (Part 2) Webinar
CTO, Dr. Brett Walkenhorst Presents Bluetooth Threats: Implementation Flaws
Like any wireless protocol, there is the associated risk of implementation flaws. In this short video, CTO Dr. Brett Walkenhorst details some of the specific implementation flaws related to Bluetooth that have the potential to escalte to a full security breach. In the video he discusses attacks such as downgrade attacks on BLE4.2 secure connection only (SCO) mode, which is centered around exploited GATT authentication, and co-located app attacks, exploiting app connectivity to Bluetooth to gain access to secure data.
Learn how Bastille can help you prepare you for today’s ever-growing wireless threat landscape, and schedule a demo and we’ll be in touch shortly.