Emerging Tech: Security — The Need for Wireless Airspace Cybersecurity
Download now▶Emerging Tech: Security — The Need for Wireless Airspace Cybersecurity
Download now▶Emerging Tech: Security — The Need for Wireless Airspace Cybersecurity
Download now▶Videos
Wireless threats visually explained and demonstrated.
Webinars
Live or recorded online presentations or workshops
Whitepapers
Authoritative reports on complex threats
Datasheets
Explore key features, specifications, and benefits
Reports
Downloadable research reports on wireless security threats.
Solution Briefs
Featured product benefits and use cases
Blog
Articles focused on wireless security insights
Research
Leading wireless research from security experts
Academy
Training and documentation
Podcast
Cybersecurity podcasts produced by Bastille
Excerpt From Bluetooth Vulnerabilities (Part 2) Webinar
CTO, Dr. Brett Walkenhorst Presents Bluetooth Threats: Implementation Flaws
Like any wireless protocol, there is the associated risk of implementation flaws. In this short video, CTO Dr. Brett Walkenhorst details some of the specific implementation flaws related to Bluetooth that have the potential to escalte to a full security breach. In the video he discusses attacks such as downgrade attacks on BLE4.2 secure connection only (SCO) mode, which is centered around exploited GATT authentication, and co-located app attacks, exploiting app connectivity to Bluetooth to gain access to secure data.
Learn how Bastille can help you prepare you for today’s ever-growing wireless threat landscape, and schedule a demo and we’ll be in touch shortly.