Friday, February 22, 2013

Bluetooth Vulnerabilities


Bluetooth Vulnerabilities and Bluetooth Security Mechanisms


Bluetooth is a peer-to-peer network and communication technology and usually lacks centralized administration, security policy and security enforcement infrastructure. 


Bluetooth Training

Bluetooth can be susceptible to a diverse set of security vulnerabilities including identity detection, location tracking, denial of service, unintended control and access of data and voice channels, and unauthorized device control and data access. 


No comments:

Post a Comment