
Sign up to save your podcasts
Or


Chris and Elecia talked through how security holes can get explored on a fictional product.
Thanks to an Embedded listener who enjoyed hearing from Jacob Martinez about helping young adults have access to technology, we have a grant to match donations to DigitalNEST up to $2500. Donate here: give.digitalnest.org/embeddedfm
We talked through OWASP Top 10 Embedded Application Best Practices but OWASP Internet of Things and OWASP Mobile Security are also very useful.
GREAT explanation of buffer overflow attacks by Coen Goedegebure
XKCD Little Bobby Tables
By Logical Elegance4.8
187187 ratings
Chris and Elecia talked through how security holes can get explored on a fictional product.
Thanks to an Embedded listener who enjoyed hearing from Jacob Martinez about helping young adults have access to technology, we have a grant to match donations to DigitalNEST up to $2500. Donate here: give.digitalnest.org/embeddedfm
We talked through OWASP Top 10 Embedded Application Best Practices but OWASP Internet of Things and OWASP Mobile Security are also very useful.
GREAT explanation of buffer overflow attacks by Coen Goedegebure
XKCD Little Bobby Tables

43,977 Listeners

32,107 Listeners

30,676 Listeners

384 Listeners

291 Listeners

625 Listeners

585 Listeners

232 Listeners

214 Listeners

164 Listeners

40 Listeners

9,527 Listeners

189 Listeners

141 Listeners

60 Listeners