Resources Video

Bluetooth Vulnerabilities

Excerpt From Introduction to Wireless Threat Intelligence Webinar
Learn More in This Video From CTO Dr. Brett Walkenhorst on Bluetooth Vulnerabilities
CTO Dr. Brett Walkenhorst presents the various vulnerabilities found in Bluetooth technology. Attackers may use those vulnerabilities to infiltrate systems and obtain unauthorized access to private data. See this video to find out more about particular attack techniques and often used malicious Bluetooth-enabled devices.

We’d love to show you around

Learn how Bastille can help you prepare you for today’s ever-growing wireless threat landscape, and schedule a demo and we’ll be in touch shortly.