YoVDO

Bluetooth Security Courses

BlueMirror - Reflections on Bluetooth Pairing and Provisioning Protocols
IEEE via YouTube
Method Confusion Attack on the Bluetooth Pairing Process
IEEE via YouTube
Back-Connect to the Connected Car - Search for Vulnerabilities in the VW Electric Car
Black Hat via YouTube
Deep into Android Bluetooth Bug Hunting - New Attack Surfaces and Weak Code Patterns
Black Hat via YouTube
BlueBorne - A New Class of Airborne Attacks that can Remotely Compromise Any Linux - IoT Device
Black Hat via YouTube
Mission mPOSsible
Black Hat via YouTube
Passive Bluetooth Monitoring in Scapy
Black Hat via YouTube
The Perimeter Has Been Shattered - Mobile and IoT Security Challenges
OWASP Foundation via YouTube
Medical Device Security: An Infectious Disease - Risks and Vulnerabilities
OWASP Foundation via YouTube
Workshop on Attacks in Crypto - Attacks on Standards
TheIACR via YouTube
< Prev Page 2 Next >