From: Ollie Whitehouse (ollie@atstake.com)
Date: Wed Oct 08 2003 - 09:13:58 EDT
All,
This got released last night, this the first paper of two I am writing on the
subject:
The Bluetooth protocol, which is deployed in millions of products ranging from
cellular telephones to laptops, is quickly becoming the new standard for
intra-device wireless communications. This paper examines methods of assessing
the security of Bluetooth devices in relation to the protocol's design and
implementation flaws. We will also discuss ways to proactively approach
Bluetooth security and what security professionals can do to defend their
organizations against unwanted compromise.
http://www.atstake.com/research/reports/#bluetooth
Rgds
Ollie
--- Ollie Whitehouse Director of Security Architecture @stake Inc / Atstake Ltd http://www.atstake.com/ --------------------------------------------------------------------------- Tired of constantly searching the web for the latest exploits? Tired of using 300 different tools to do one job? Get CORE IMPACT and get some rest. www.coresecurity.com/promos/sf_ept2 ----------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:41 EDT