• Watch
  • Listen
  • Live Stream
Security Weekly
Security Market Validation
  • Listeners
    • Subscribe
    • Insider List
    • Suggest a Guest
  • Shows
    • Paul’s Security Weekly
    • Enterprise Security Weekly
    • Business Security Weekly
    • Application Security Weekly
    • Security & Compliance Weekly
    • Security Weekly News
    • Tradecraft Security Weekly
    • Secure Digital Life
  • Series
    • CISO Stories
  • Webcasts/Trainings
    • Registration
    • On-demand
  • Articles
  • Partners
    • Become a Partner
    • Landing Pages
    • Bookings
      • Approved Interview Form
      • Approved Interview Form – Returning Guest
      • Conference Collection Form
  • Hosts
  • Company
    • About
    • Contact
    • Careers

Articles

The Internet of Insecure Things: Presentation and New Course

Paul Asadoorian asadoorian, embedded systems, firmware, firmware reverse engineering, hacking, hacking routers, paul asadoorian, pauldotcom, security weekly, wireless routers June 23, 2014

So far I’ve presented on this topic at Northeast Linuxfest, Charlotte ISSA and most recently NOLA con. If you enjoy this presentation and/or want to learn more about assessing, finding vulnerabilities and securing embedded systems, I am writing a two-day course on the subject. All of the details can be found here:

Embedded Device Security Assessments For The Rest Of Us

This course will be offered for the first time at SANS on October 26-27, 2014 in Las Vegas. The link above will get you to the registration page!

Below are the latest slides for the 50 minute presentation on the subject:

The Internet of Insecure Things: 10 Most Wanted List from Security Weekly

A newer version of this talk will make an appearance at Derbycon this fall, so stay tuned!

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Facebook (Opens in new window)

Related Posts

linux security

Articles /

How to Defend Linux from Attacks

tea leaves

Articles /

Reading the Application Security Tea Leaves – How to Interpret the Analyst Reports

Behavior Detections

Articles /

How Behavioral Detections Actually Discovered the SolarWinds Orion SUNBURST Attack

‹ Oops! I did it again….I played with Vulnhub, got lost in Brainpan.. › Blackhat & Defcon 2014: Come Check Us Out!

About Security Weekly

Security Weekly is the security podcast network for the security community, distributing free podcasts and media since 2005. We connect the security industry and the security community through our security market validation programs.

More Than Just A Sponsor

We view our relationships with the security industry as partnerships, not sponsorships. Security Weekly works closely with each partner to help you achieve your marketing goals and gain traction in the security market. Interested in becoming a partner? Please visit our partnerships page.

Back to Top

Subscribe To The Blog:

RSS Feed RSS - Posts

Search

Follow Us On Twitter

→ Follow Us
© Security Weekly 2021
Powered by WordPress • Themify WordPress Themes