Latest Tutorials
Check out our newest IoT tutorials and guides

5G vs LoRaWAN: The Ultimate Comparison for IoT Developers
5G vs LoRaWAN is one of the most critical decisions IoT architects and developers face when designing connected systems. Both technologies enable wireless communication, but they serve vastly different use cases, constraints and deployment models. Understanding their strengths, limitations and ideal applications is essential for building scalable, cost-effective and reliable IoT solutions. This in-depth comparison […]

MQTT vs CoAP: The Ultimate Comparison for IoT Protocols
MQTT vs CoAP is a fundamental question for IoT developers choosing a messaging protocol for constrained devices and networks. Both protocols are lightweight, open standards designed for machine-to-machine (M2M) communication, but they differ significantly in architecture, transport layer, use cases, and performance characteristics. This in-depth comparison breaks down their technical foundations, strengths, weaknesses, and ideal […]

Future Trends in Embedded Security
Embedded security does not stand still. The threat landscape that engineers design against today is materially different from the one that existed when the Mirai botnet demonstrated in 2016 that millions of unpatched, default-password IoT devices could be weaponised into the largest DDoS infrastructure ever assembled. Since then, the scale of the connected device ecosystem […]
Explore IoT Snacks Tutorials
Bite-sized IoT tutorials covering sensors, microcontrollers, connectivity, and cloud integration. Learn at your own pace.
Comparison
In this category you will find the comparison between different development boards as well iot clouds and the latest news about iot and embedded industry.
Embedded Security
Learn Embedded Security with hands-on tutorials
ESP32
Discover the power of the ESP32! Dive into in-depth tutorials, project ideas, and technical insights for Espressif's flagship microcontroller. Perfect for hobbyists, makers, and developers looking to build advanced IoT applications with Wi-Fi and Bluetooth capabilities.
ESP8266
Unlock the potential of the ESP8266. Explore beginner-friendly guides, cost-effective project builds, and essential tips for using this popular and affordable Wi-Fi enabled microcontroller. Ideal for those venturing into the world of IoT on a budget.
Comparison
In this category you will find the comparison between different development boards as well iot clouds and the latest news about iot and embedded industry.

5G vs LoRaWAN: The Ultimate Comparison for IoT Developers
5G vs LoRaWAN is one of the most critical decisions IoT architects and developers face when designing connected systems. Both technologies enable wireless communication, but they serve vastly different use cases, constraints and deployment models. Understanding their strengths, limitations and ideal applications is essential for building scalable, cost-effective and reliable IoT solutions. This in-depth comparison […]

MQTT vs CoAP: The Ultimate Comparison for IoT Protocols
MQTT vs CoAP is a fundamental question for IoT developers choosing a messaging protocol for constrained devices and networks. Both protocols are lightweight, open standards designed for machine-to-machine (M2M) communication, but they differ significantly in architecture, transport layer, use cases, and performance characteristics. This in-depth comparison breaks down their technical foundations, strengths, weaknesses, and ideal […]

Thread vs Zigbee vs Matter vs BLE: The Ultimate Smart Home Protocol Comparison Guide
Choosing the right wireless protocol for your smart home or IoT project can be overwhelming. Thread, Zigbee, Matter and BLE (Bluetooth Low Energy) are the four major players in 2026, but they serve different purposes and work in fundamentally different ways. This comprehensive guide breaks down every difference to help you make the right choice. […]
Embedded Security

Tools for Embedded Security Testing
Embedded security testing spans four disciplines that each require their own toolset: static and dynamic code analysis to find vulnerabilities before firmware ships, hardware attack tools to test the physical security of the device itself, network protocol analyzers to verify that communication is correctly secured, and firmware forensics tools to reverse-engineer and investigate binary images. […]

Embedded Security Best Practices and Guidelines
The majority of embedded device security incidents are caused by a small, well-documented set of avoidable mistakes: hardcoded credentials, unvalidated inputs, broken cryptography, open debug interfaces left enabled in production, and missing update mechanisms. These failures are not exotic; they appear repeatedly across product categories and vendors because the pressures of embedded development (resource constraints, […]

Future Trends in Embedded Security
Embedded security does not stand still. The threat landscape that engineers design against today is materially different from the one that existed when the Mirai botnet demonstrated in 2016 that millions of unpatched, default-password IoT devices could be weaponised into the largest DDoS infrastructure ever assembled. Since then, the scale of the connected device ecosystem […]
ESP32
Discover the power of the ESP32! Dive into in-depth tutorials, project ideas, and technical insights for Espressif's flagship microcontroller. Perfect for hobbyists, makers, and developers looking to build advanced IoT applications with Wi-Fi and Bluetooth capabilities.

HC-SR501 PIR Motion Sensor with ESP32 DOIT Kit v1
Introduction The HC-SR501 PIR (Passive Infrared) sensor is used to detect motion by sensing infrared radiation from objects, mainly humans and animals. Itβs widely used in security systems, automatic lights, and smart IoT projects. Key features: In this tutorial, weβll connect the HC-SR501 PIR sensor to ESP32 (GPIO 18), read motion detection signals, and display […]

Interfacing NEO-6M GPS Module with ESP32 DOIT Kit v1
Introduction The NEO-6M GPS module is a powerful, low-cost GPS receiver that allows your ESP32 projects to access real-time location data, including latitude, longitude, altitude, and time. GPS technology is widely used in applications such as navigation systems, asset tracking, robotics, weather stations, and even agriculture monitoring. The ESP32 DOIT Kit v1, with its built-in […]

SG90 Servo Motor with ESP32 DOIT Kit v1
Introduction The SG90 servo motor is a lightweight and low-cost motor commonly used in robotics, IoT, and automation projects. Unlike DC motors, which rotate continuously, a servo motor can be controlled to move to a specific angle (0Β°β180Β°) with great precision. The ESP32, with its PWM (Pulse Width Modulation) capability, is perfect for controlling servo […]
ESP8266
Unlock the potential of the ESP8266. Explore beginner-friendly guides, cost-effective project builds, and essential tips for using this popular and affordable Wi-Fi enabled microcontroller. Ideal for those venturing into the world of IoT on a budget.

HC-SR501 PIR Motion Sensor with ESP8266
Introduction The HC-SR501 PIR (Passive Infrared) Motion Sensor is one of the most widely used sensors for detecting human and animal movement. It works by detecting changes in infrared radiation (heat) emitted by living beings. When motion is detected, the sensor outputs a HIGH signal, which can be read by a microcontroller like the ESP8266. […]

Capacitive Soil Moisture Sensor with ESP8266
Introduction A Capacitive Soil Moisture Sensor is an advanced version of the traditional resistive soil moisture sensor. Unlike resistive sensors, which corrode easily due to direct exposure to water and soil electrolytes, the capacitive sensor uses capacitance to measure moisture levels. This makes it more durable, accurate, and long-lasting. When soil is wet, its dielectric […]

HC-SR04 Ultrasonic Sensor with ESP8266
Introduction The HC-SR04 Ultrasonic Sensor is widely used to measure distance by emitting ultrasonic waves and measuring the time it takes for the echo to return. It works like sonar: The ESP8266 reads this timing and converts it into centimeters (cm) or inches (in). Ultrasonic sensors are commonly used in robotics, automation, parking sensors, and […]
Most Popular Tutorials
Explore our most visited IoT tutorials

5G vs LoRaWAN: The Ultimate Comparison for IoT Developers
5G vs LoRaWAN is one of the most critical decisions IoT architects and developers face when designing connected systems. Both technologies enable wireless communication, but they serve vastly different use cases, constraints and deployment models. Understanding their strengths, limitations and ideal applications is essential for building scalable, cost-effective and reliable IoT solutions. This in-depth comparison […]

MQTT vs CoAP: The Ultimate Comparison for IoT Protocols
MQTT vs CoAP is a fundamental question for IoT developers choosing a messaging protocol for constrained devices and networks. Both protocols are lightweight, open standards designed for machine-to-machine (M2M) communication, but they differ significantly in architecture, transport layer, use cases, and performance characteristics. This in-depth comparison breaks down their technical foundations, strengths, weaknesses, and ideal […]

Hardware Security and Secure Boot
Software security controls are only as strong as the hardware layer beneath them. An attacker who can bypass the boot sequence, read flash directly or inject a voltage glitch to skip an authentication check defeats every software protection you built, regardless of how correct that code is. This article covers embedded hardware security from the […]

Introduction to Embedded Systems Security
Embedded systems security is one of the fastest-growing disciplines in both IoT and industrial engineering, yet it remains poorly understood by many of the engineers who build these devices. This article covers what embedded systems are, why they are uniquely difficult to secure, where real attacks have caused measurable damage and what threat categories you […]

Embedded System Attack Surfaces
Every interface, protocol and memory region in an embedded system is a potential entry point for an attacker. Understanding the embedded system attack surface starts with understanding the architecture itself: how hardware layers, firmware, memory types, debug interfaces and communication protocols connect and where each one introduces exploitable exposure. This article works through all of […]

Common Embedded System Vulnerabilities and Threats
The most common embedded system vulnerabilities are not exotic zero-days. They are repeating patterns: buffer overflows from unsafe C functions, credentials compiled directly into firmware, debug ports left open on shipped hardware, third-party libraries nobody maintains any more. This article works through every major vulnerability category in the embedded threat landscape, from firmware-level coding flaws […]