Embedded Device Hacking

  • Formal
  • The exploiting of vulnerabilities in embedded software to gain control of the device. Embedded systems exist in a wide variety of devices including Internet and wireless access points, IP cameras, security systems, drones, and industrial control systems.
  • Practical
  • Attackers have hacked embedded systems to spy on the devices, to take control of them or simply to disable (brick) them. Embedded systems exist in a wide variety of devices including Internet and wireless access points, IP cameras, security systems, pace makers, drones and industrial control systems.

Contact us

Let's talk!

* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.