Excerpt From Introduction to Wireless Threat Intelligence Webinar
Learn More in This Video From CTO Dr. Brett Walkenhorst on Bluetooth Vulnerabilities
CTO Dr. Brett Walkenhorst presents the various vulnerabilities found in Bluetooth technology. Attackers may use those vulnerabilities to infiltrate systems and obtain unauthorized access to private data. See this video to find out more about particular attack techniques and often used malicious Bluetooth-enabled devices.
UPCOMING REPORT: The Need for Wireless Airspace Defense
Get early access