This document is a seminar report on Bluetooth network security submitted in partial fulfillment of a Bachelor of Technology degree. It discusses Bluetooth technology, including its architecture and classes/ranges. It covers security aspects at the link and application layers and tools that can be used to attack Bluetooth networks, like Bluejacking and Bluesnarfing. It also lists advantages like low cost and wireless capability, disadvantages like short range and hackability. Applications discussed include wireless headphones, mobile device connectivity, and medical sensors.