What Makes A Chip Tamper-Proof?


The cyber world is the next major battlefield, and attackers are busily looking for ways to disrupt critical infrastructure. There is widespread proof this is happening. “Twenty-six percent of the U.S. power grid was found to be hosting Trojans," said Haydn Povey, IAR Systems' general manager of embedded security solutions. "In a cyber-warfare situation, that's the first thing that would b... » read more

Making Mobile Payments Simple


Shopping will one day become a truly interactive experience, with Bluetooth and Wi-Fi beacons scanning digital profiles, stored in the cloud and accessed on mobile devices and wearables, to generate recommendations in real time. Although beacon deployment is still ramping up, the technology is poised to play a critical role in the evolution of mobile payments as consumers begin to truly interac... » read more