
Blog Post
Five Software Tips for Securing IoT Devices
I’ve got a new blog post up today at EE Times, discussing how to secure devices on the Internet of Things: It used to be academically interesting, perhaps, that an attacker could compromise an unconnected home thermostat. Today, it’s another thing entirely that an attacker can potentially target thousands of home thermostats from afar, determine... View Article

Blog Post
The Internet of Things — and How Those Things Phone Home
There's a lot of buzz about the Internet of Things — a catchphrase designed to encompass a range of embedded devices that connect to cloud servers to act more intelligently than they could on their own.
One problem that comes up is how to design the Thing to connect back to the Cloud Server — how does the Thing phone home? It's tricky, because, usually, we are trying to balance several factors.

Blog Post
Sniffing iPad Traffic
Our engineering expert details how to capture and analyze all the network traffic flowing to and from a Wi-Fi-enabled device using a network sniffer.
I’ve got a new blog post up today at EE Times, discussing how to secure devices on the Internet of Things: It used to be academically interesting, perhaps, that an attacker could compromise an unconnected home thermostat. Today, it’s another thing entirely that an attacker can potentially target thousands of home thermostats from afar, determine... View Article
There's a lot of buzz about the Internet of Things — a catchphrase designed to encompass a range of embedded devices that connect to cloud servers to act more intelligently than they could on their own.
One problem that comes up is how to design the Thing to connect back to the Cloud Server — how does the Thing phone home? It's tricky, because, usually, we are trying to balance several factors.
Our engineering expert details how to capture and analyze all the network traffic flowing to and from a Wi-Fi-enabled device using a network sniffer.