This paper will attempt to provide a basic understanding of what Bluetooth is and how it works. It will then describe the critical elements of Bluetooth security as well as potential security weaknesses. Finally, it will provide some guidelines for using Bluetooth securely.