If you are developing Internet of Things devices, you should be sure that you are protecting yourself against the top five IoT vulnerabilities!

Top Five Internet of Things Vulnerabilities
Published 04/15/2016

If you are developing Internet of Things devices, you should be sure that you are protecting yourself against the top five IoT vulnerabilities!
The Internet of Things is growing exponentially! Get on board with this exciting technology.
Use the code provided to determine when a USB Thumb drive or other USB-based storage media is plugged in or removed.
In the IoT world of embedded devices, small is beautiful and small doesn't come much better than the NancyFX Web framework.
Use a modest modem to connect your IoT devices to the world.
Learn about something called "Google Protocol Buffers," and watch for later posts on other IoT subjects.