Bluetooth Data Exfiltration   

Bluetooth tethering can be used to pair a network device with a cellular data path (e.g. 4G LTE) which bypasses your traditional network security. How do you detect when someone starts Bluetooth tethering in your building? How do you avoid false alarms when the Bluetooth is only being used to connect a headset?

To learn more about the cellular, Wi-Fi, Bluetooth and many other RF-enabled devices operating in your environment read the Bastille data sheet or request a Bastille demo.

Learn more about other Internet of Radios vulnerabilities