Copy
Join us as we examine the security vulnerabilities of two of the most popular IoT and Machine to Machine protocols and share recommendations, tips and tools to nip attacks in the bud. In a separate article, we'll show you how to convert your NetBurner device into a formidable data logger!

IoT Machine Protocol Vulnerabilities

MQTT and CoAP are two of the leading M2M protocols. Both are very easy to use, adaptable and lightweight protocols suitable for effectively connecting a large array of resource-constrained devices over the internet. We share findings from a recent report exposing their security vulnerabilities and provide useful tips and tools that will help you move ahead.

Read On

Real-Time Data Logging for Embedded Systems and IoT

In this article, we review an example that showcases a modular, efficient real-time data logging system designed to run on a NANO54415, though it can be easily ported to other NetBurner modules. The example uses the data logging system to instantiate a logging object with some dummy values which are modified over time. These values are then written to a log file which is stored in volatile flash memory (deleted when you turn off the module) and can be transmitted to a computer via FTP.
Read On
Network with us:
Copyright © 2019 NetBurner, Inc, All rights reserved.


Want to change how you receive these emails?
You can update your preferences or unsubscribe from this list.