Can The IoE Ever Be Secure?


There are many different opinions about how the [getkc id="76" comment="Internet of Things"]/[getkc id="260" comment="Internet of Everything"] ultimately will look, who is best positioned to take advantage of it, and how processing will be split between local devices, the cloud, and everything in between. But there is almost universal agreement on one point: It's not secure enough. "In the p... » read more

Anything As A Service


Everything as a service promises to simplify our lives, from cutting edge business to consumer applications. It is too early to tell, but the concept of everything moving to the cloud poses some interesting issues, from bandwidth to security. Who would have guessed that in 2015, launching a business would require virtually no physical assets? You simply turn on your computer and everything y... » read more

Rising Threats From Differential Power Analysis


Differential power analysis (DPA) has been a threat vector on the chip landscape for a number of years. It was discovered around the mid 1990s by the teams at [getentity id="22671" e_name="Rambus"]’ Cryptography Research Division, and turned out to be a very effective tool for compromising the ubiquitous SIM card environment. “The most traditional market for DPA has been with smart cards... » read more

Can Cars Be Hack-Proof?


Not many days go by when there isn't a news headline describing the latest hacking attempt — or success — of an automobile or automotive system. Malicious hacking has been around almost since the dawn of connected electronics, but it's happening with increasing sophistication in the automotive sector. Even high-end vehicles suffer security flaws that are too costly or not worthwhile to f... » read more

Lightweight Cryptography For The IoE


This is the age where technology is expected to do more, faster, anonymously, and often invisibly. And it's supposed to use less power, with smaller footprints, unobtrusively and intuitively. And all that needs to be protected with cryptography. That's the goal, at least. But as Simon Blake-Wilson, vice president of products and marketing for [getentity id="22671" e_name="Rambus"]' Cryptogra... » read more

More Than Just Plastic


The magnetic strip credit card era is coming to an end. The technology is antiquated, prone to security vulnerabilities, and has no self-destruct capability if lost or stolen. In its place are near-field technologies coupled with smart devices—think Apple Pay, Android Pay, Samsung Pay, digital wallets, MasterCard's PayPass—and now near-field communication (NFC) chips inside of cards. But... » read more

Big Data, Big Holes


Having the potential to collect massive amounts of data from a variety of sources is the latest tool for trend spotting, predictive modeling, and forecasting of information. Information is power and big data promises to provide substantial, significant data that can be used by all tiers of businesses in the development of any number of new industrial and commercial strategies. For retailers ... » read more

Mobile Security And The IoE


As we climb that mobility ladder to becoming a mostly mobile society, every rung seems to expose us to more and more layers of security failings. Six billion of the seven billion people on this planet rely on a variety of mobile devices to shop, bank, interface with social media, monitor their health, and monitor their environment. Unless you are on the inside track and know better, one would t... » read more

Red Tape And Health Care Security


The health care industry is still woefully ill-prepared for the Cyber Age. This is a rather dismal assessment, considering that the volume of personal health-related data is an order of magnitude greater than the equivalent data in the financial segment and growing rapidly. Courtesy: Intel The past decade has seen the health-care records industry go electronic. While that may be great f... » read more

The Challenges Of IoT Security


In 1903, magician and inventor Nevil Maskelyne disrupted a public demonstration of Marconi's purportedly secure wireless telegraphy technology by sending insulting Morse code messages through the auditorium’s projector. Although Maskelyne’s “Gray Hat” stunt is now only a distant memory, industry experts are still grappling with the challenge of securing new technology well over a ce... » read more

← Older posts Newer posts →