This first in a series of articles explaining embedded security vulnerabilities offers tips on how to build more secure devices in the IoT era.