Basic Bluetooth security

Thursday, 13 October 2005, 12:26 PM EST

Bluetooth security implementation revolves around making devices as well as services offered by them secure. This is a continuous effort that is being undertaken by the manufacturers of devices that use Bluetooth.

For example, between devices, there are two levels, "trusted device" and "untrusted device". A trusted device, having been paired with one's other device, has unrestricted access to all services offered by the latter.

By Azhar Abu Bakar at Red Nova.

[ Read more ]




Spotlight

Staples customers likely the latest victims of credit card breach

Posted on 21 October 2014.  |  Multiple banks say they have identified a pattern of credit and debit card fraud suggesting that several Staples Inc. office supply locations in the Northeastern United States are currently dealing with a data breach.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Oct 22nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //