Security and the IoT are terms becoming intrinsically linked in the grand discussion of connected devices and their envisioned applications in virtually every aspect of our ecosystem, whether it be consumer wearables, medical devices, or industrial systems.
By now, many of you have heard about the "BadUSB" exploit, where two security researchers at Security Research Labs demonstrated how they could perpetrate an attack on USB devices.
In their book, Embedded Systems Security, David and Michael Kleidermacher point out some all-to-real scenarios about the consequences of malicious threats to embedded systems.
Dieser Bildschirm reduziert den Stromverbrauch des Monitors, wenn Sie nicht auf unserer Website aktiv sind. Um die Suche fortzusetzen, bewegen Sie einfach die Maus.