Webinar
Recent Bluetooth and BLE Threats
Dr. Bob Baxley, CTO and Head of the Bastille Threat Research Team examines how hackers can use recently disclosed Bluetooth and Bluetooth Low Energy (BLE) vulnerabilities to bypass your security, gain access to your systems, and exfiltrate data and voice information. Using research from the Bastille Threat Research team as well as analysis of data from the National Vulnerability Database, Dr. Baxley will examine 8 Recent Bluetooth and BLE Device Attacks.
Presenter: Dr. Baxley is CTO, Bastille and former Director of the Software Defined Radio Lab at Georgia Tech (bio here).
Recent Bluetooth and Bluetooth Low Energy Attacks, which:
Affect Billions of Devices
Allow Hackers to use RF as a Vector for Cybercrime
Affect All Networks and Locations
Impact the Devices we use Everyday
Disrupt our Networks, Buildings and National Infrastructure
How to use Radio Frequency (RF) detection and location technologies to:
Detect, Locate and Isolate Devices Vulnerable to Attack
Integrate Radio Frequency for Bluetooth and BLE security into your Security Infrastructure
Geofence Sensitive Areas and Receive Alerts
Conduct Forensic Analysis of Threats
Tag Devices by Manufacturer
Speaker:
Dr. Bob Baxley, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech