Filter By:

Recent Blogs & Podcasts

Back to Insights

Bluetooth Security Risks: An Overview

November 10, 2016 | Converged Infrastructure
By Aaron Turner, IANS Faculty

When it comes to evaluating Bluetooth security risks, it's important to divide up the technology into different sections and examine the potential risks of each. In this Ask-an-Expert written response, IANS Faculty Aaron Turner evaluates Bluetooth security from the perspectives of physical-layer, protocol implementation and application-layer vulnerabilities.



Please Login to continue

Related Research

6/5/2017 | Blog
Poulin: Design Connected Systems With Security in Mind

4/12/2017 | Ask-an-Expert
Deploying NAC for Both Wired and Wireless Networks

4/5/2017 | Ask-an-Expert
Detecting Rogue Wireless Access Points