Weak security is not an accident

The author of this piece attributes many common security defects in IoT devices to the re-use of reference designs, 3rd party web-based services, and use of shady off-shore vendors. All true – but I’ll add rampant sub-standard programmer competence. Code schools are cranking out “developers” with little knowledge of computers and communications. To these coders, API’s are bridges to magic, rainbows and elfin people. 

By: Bernie Crump, MobileM2M

Posted: November 21, 2019

Share this post


Sign up for our Newsletter

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit