SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsHidden Bluetooth Low Energy (BLE) credit skimmers are a growing threat to credit card fraud. Criminals can set up practical and inexpensive systems built on top of modules, such as the HM-19, to collect and transmit stolen data covertly across wireless channels. Criminals are utilizing modern technology to complicate traditional forensic processes by reducing the device's footprint, encrypting onboard storage, and creating potentially unpredictable behavior. New forensic processes must be generated to account for the increasing changes in technology. Customized Python-based scripts can be generated to assist with capturing live Bluetooth Low-Energy (BLE) data based on known patterns within historical devices and interfaces.