In Bluetooth LE (BLE), security is a multifaceted beast. Learn the three main security modes of BLE, along with five critical BLE security procedures.
2 days ago by Nthatisi Hlapisi
Learn the roles of the three security keys in Bluetooth LE—Long Term Key (LTK), Connection Signature Resolving Key (CSRK), and Identity Resolving Key (IRK).
August 13, 2023 by Nthatisi Hlapisi
Electromagnetic-based side-channel attacks are non-invasive, meaning the attacker does not need physical access to the device to steal information. We’ll look at how these EM side-channel attacks work.
July 26, 2023 by Jake Hertz
Learn about Bluetooth LE's security features and tools, how to use them, and understand how they keep connections secure.
June 23, 2023 by Nthatisi Hlapisi
Don't have an AAC account? Create one now.
Forgot your password? Click here.