Abstract: Bluetooth offers the convenience of low-power wireless device-to-device communication, opening the door for diverse and exciting use cases for recreational and business users. The proliferation of Bluetooth into a broad range of modern personal devices has generated a demand for software applications that enable users to interact with it. As with other technologies, threats exist today that endanger the integrity, confidentiality, and availability of the information transferred to and from devices using Bluetooth. The design of any software involved in transferring data via Bluetooth should include measures to protect the user’s device and data. This document provides background on Bluetooth functionality and recommendations for developing secure Bluetooth applications.
Date Published: 04 August 2016
Last Reviewed: 28 October 2015
Creator: Vulnerability Solutions
Dissemination Control: N/A
Length: 13 page(s)