Earn Your Business Degree, Tuition-Free, 100% Online!
Get 20% off all career paths from fullstack to AI
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore critical security vulnerabilities in Microhard's long-range radio equipment through this 18-minute conference talk from DEF CON 32. Discover how the Canadian company's products, widely used in SCADA environments, point-of-sale terminals, and power utilities, contain significant security flaws including command injections and buffer overflows. Learn about the company's practice of obscuring vulnerability fixes behind vague release notes, and understand the broader implications for secure development processes in industrial communication equipment. Gain valuable insights into the security challenges facing critical infrastructure components and the importance of transparent security practices in industrial systems.
Syllabus
DEF CON 32 - MicroHard More Like MicroEasy to Exploit - Ricky Lawshae
Taught by
DEFCONConference