BLUEBORNE VULNERABILITIES IN BLUETOOTH IMPLEMENTATIONS IN DIFFERENT OPERATION SYSTEMS
Journal: International Scientific Journal "Internauka" (Vol.1, No. 53)Publication Date: 2018-07-15
Authors : Tykhonov Konstiantyn;
Page : 36-38
Keywords : Bluetooth; BlueBorn; Information Security;
Abstract
Ubiquitous adaptation of protocols and technologies for implementations of old solutions in new platform make it more unsecured. That leads to constant change and adaptation. Many solutions aren't revised and insufficiently tested, which is connected to spectrum of systems and devices. It isn't surprising that one of the main and most popular technology stacks - Bluetooth have serious vulnerabilities.
Other Latest Articles
- WIRELESS ACCESS POINTS VULNERABILITIES AND PROTECTION METHODS FOR THEM
- HISTORY OF TELEVISION DEVELOPMENT IN THE CONTEXT OF COMMUNICATION FEATURES OF THE OFF-LINE MODEL
- PHENOMENON OF COLLECTING IN THE CONTEXT OF VISUAL CULTURE
- CONCEPT OF EFFICIENT AND EQUITABLE SELF-REGULATING SOCIO-ECONOMIC SYSTEM
- THE ROLE OF FINANCIAL MANAGEMENT IN THE ACTIVITIES OF ENTERPRISES
Last modified: 2018-08-08 01:48:06