View Post

Common Bluetooth Vulnerabilities to be Aware of

In Cybersecurity by Ian CarnaghanLeave a Comment

This entry is part 8 of 10 in the series Intrusion Detection

Bluetooth connectivity has grown immensely in popularity with mobile devices in the last number of years. The convenience factor of being able to have a hands-free experience with a mobile phone while driving or out and about has fueled this growth. Unfortunately, like all conveniences there are typically downsides. In the case of Bluetooth, there have been a number of …

Share