
Sign up to save your podcasts
Or


Chris and Elecia talked through how security holes can get explored on a fictional product.
Thanks to an Embedded listener who enjoyed hearing from Jacob Martinez about helping young adults have access to technology, we have a grant to match donations to DigitalNEST up to $2500. Donate here: give.digitalnest.org/embeddedfm
We talked through OWASP Top 10 Embedded Application Best Practices but OWASP Internet of Things and OWASP Mobile Security are also very useful.
GREAT explanation of buffer overflow attacks by Coen Goedegebure
XKCD Little Bobby Tables
By Logical Elegance4.8
188188 ratings
Chris and Elecia talked through how security holes can get explored on a fictional product.
Thanks to an Embedded listener who enjoyed hearing from Jacob Martinez about helping young adults have access to technology, we have a grant to match donations to DigitalNEST up to $2500. Donate here: give.digitalnest.org/embeddedfm
We talked through OWASP Top 10 Embedded Application Best Practices but OWASP Internet of Things and OWASP Mobile Security are also very useful.
GREAT explanation of buffer overflow attacks by Coen Goedegebure
XKCD Little Bobby Tables

272 Listeners

382 Listeners

289 Listeners

623 Listeners

270 Listeners

583 Listeners

231 Listeners

70 Listeners

986 Listeners

40 Listeners

8,062 Listeners

189 Listeners

63 Listeners

141 Listeners

66 Listeners