1 hr 2 min

312: Two Meter Exhaust Port Embedded

    • Technology

Chris and Elecia talked through how security holes can get explored on a fictional product.
Thanks to an Embedded listener who enjoyed hearing from Jacob Martinez about helping young adults have access to technology, we have a grant to match donations to DigitalNEST up to $2500. Donate here: give.digitalnest.org/embeddedfm
We talked through OWASP Top 10 Embedded Application Best Practices but OWASP Internet of Things and OWASP Mobile Security are also very useful.
GREAT explanation of buffer overflow attacks by Coen Goedegebure
XKCD Little Bobby Tables

Chris and Elecia talked through how security holes can get explored on a fictional product.
Thanks to an Embedded listener who enjoyed hearing from Jacob Martinez about helping young adults have access to technology, we have a grant to match donations to DigitalNEST up to $2500. Donate here: give.digitalnest.org/embeddedfm
We talked through OWASP Top 10 Embedded Application Best Practices but OWASP Internet of Things and OWASP Mobile Security are also very useful.
GREAT explanation of buffer overflow attacks by Coen Goedegebure
XKCD Little Bobby Tables

1 hr 2 min

Top Podcasts In Technology