Monday, May 20, 2019

BP 5/20

BP 5/20: Bluetooth's Complexity Has Become a Security Risk

WHat is the BlueBorne flaw?
How is Bluetooth developed?
How can malicious third parties use Bluetooth?
What issues did BoxLock run into?
What's the next step for bluetooth?
What's the safest thing to do if you aren't using Bluetooth?

No comments:

Post a Comment

BP 5/20

BP 5/20: Bluetooth's Complexity Has Become a Security Risk WHat is the BlueBorne flaw? How is Bluetooth developed? How can malicious...