Connected devices are on the rise and here to stay. While they can make our lives much easier they also make easier targets for threat actors. Here we take a look at how someone could reverse engineer an embedded device, and at the process for attempting to find vulnerabilities.Read more...
Entries filed under 'Hacking'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
July 17, 2014 10:00 AM By Kyle Wilhoit