Whitepaper Tag

maxim embedded security
Guest blog by Christine Young From Yahoo to LinkedIn, smart speakers to security cameras, DVRs, and even baby monitors—all of these things have been hacked at some point (or points, in some incidents). As smart, connected products become more pervasive in our everyday lives, they also provide more avenues for cybercriminals. In some cases, it’s a matter of end users needing to be more diligent about, say, changing default logins and passwords. In other cases, the device itself simply wasn’t designed with very strong security. The first case is aRead More