<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Embedded Insights Channels &#187; USB</title>
	<atom:link href="http://www.embeddedinsights.com/channels/topics/usb/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.embeddedinsights.com/channels</link>
	<description>Shedding Light on the Hidden World of Embedded Systems</description>
	<lastBuildDate>Fri, 14 Jun 2013 17:33:02 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.0</generator>
		<item>
		<title>When and how much should embedded developers implement robust defenses against malicious software in their designs?</title>
		<link>http://www.embeddedinsights.com/channels/2010/09/29/when-and-how-much-should-embedded-developers-implement-robust-defenses-against-malicious-software-in-their-designs/</link>
		<comments>http://www.embeddedinsights.com/channels/2010/09/29/when-and-how-much-should-embedded-developers-implement-robust-defenses-against-malicious-software-in-their-designs/#comments</comments>
		<pubDate>Wed, 29 Sep 2010 17:14:00 +0000</pubDate>
		<dc:creator>Robert Cravotta</dc:creator>
				<category><![CDATA[Question of the Week]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[USB]]></category>

		<guid isPermaLink="false">http://www.embeddedinsights.com/channels/?p=329</guid>
		<description><![CDATA[Malware is showing up in various consumer products that support a USB connection. Unfortunately, that USB connection is providing a mechanism for malware to infect computers. Recent examples affected devices sold or handed out by Olympus and IBM. How should embedded developers respond to this type of vulnerability?]]></description>
		<wfw:commentRss>http://www.embeddedinsights.com/channels/2010/09/29/when-and-how-much-should-embedded-developers-implement-robust-defenses-against-malicious-software-in-their-designs/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
