Basic Bluetooth security

Thursday, 13 October 2005, 12:26 PM EST

Bluetooth security implementation revolves around making devices as well as services offered by them secure. This is a continuous effort that is being undertaken by the manufacturers of devices that use Bluetooth.

For example, between devices, there are two levels, "trusted device" and "untrusted device". A trusted device, having been paired with one's other device, has unrestricted access to all services offered by the latter.

By Azhar Abu Bakar at Red Nova.

[ Read more ]




Spotlight

Implementing an effective risk management framework

How do we balance the benefit of the free flow of information with the risk of inappropriate access and/or disclosure? What are the consequences of not doing so?


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Thu, Mar 26th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //