nullcon Delhi 2012: Day 2's action

4/14

How to develop an insecure product

Zoltán Hornák of Search Labs, Hungary explained about vulnerabilities spilling over from software onto unlikely and unexpected areas such as video set-top boxes, medical diagnostic equipment and even cars in this session. The talk discussed attacks against embedded systems and the need for a security lifecycle while engineering these products. The session featured a demonstration with a case study on set-top boxes.

Executive brief for this session (PDF)

<<In case you missed Day 1’s action, catch it here.

 

View All Photo Stories
Search CIO
Search Security
Search Networking
Search Data Center
Search Data Management
Close