
Sign up to save your podcasts
Or
Chris and Elecia talked through how security holes can get explored on a fictional product.
Thanks to an Embedded listener who enjoyed hearing from Jacob Martinez about helping young adults have access to technology, we have a grant to match donations to DigitalNEST up to $2500. Donate here: give.digitalnest.org/embeddedfm
We talked through OWASP Top 10 Embedded Application Best Practices but OWASP Internet of Things and OWASP Mobile Security are also very useful.
GREAT explanation of buffer overflow attacks by Coen Goedegebure
XKCD Little Bobby Tables
4.8
185185 ratings
Chris and Elecia talked through how security holes can get explored on a fictional product.
Thanks to an Embedded listener who enjoyed hearing from Jacob Martinez about helping young adults have access to technology, we have a grant to match donations to DigitalNEST up to $2500. Donate here: give.digitalnest.org/embeddedfm
We talked through OWASP Top 10 Embedded Application Best Practices but OWASP Internet of Things and OWASP Mobile Security are also very useful.
GREAT explanation of buffer overflow attacks by Coen Goedegebure
XKCD Little Bobby Tables
282 Listeners
229 Listeners
265 Listeners
591 Listeners
627 Listeners
213 Listeners
154 Listeners
65 Listeners
7,872 Listeners
189 Listeners
64 Listeners
135 Listeners
140 Listeners
92 Listeners
47 Listeners