Understanding security threats to embedded systems and IoT devices
Description
December 27, 2019
This video summarizes why hackers might attack an embedded device followed by a short overview of remote and physical attack methods. It then discusses four actual attacks on embedded systems, such as point of sales terminals and smart meters, detailing the weaknesses that the attack exploited to gain control or access to the system.