Security Threats and Countermeasures in Bluetooth-Enabled Systems