The Race To Secure The Car


A shift is underway in the automotive industry to connect cars to each other and to a variety of communications infrastructure, adding many of the features that consumers now expect in mobile devices as well as some new ones that ultimately will lead to autonomous vehicles. But along with those changes are some nagging questions about just how safe that technology will be for consumers and othe... » read more

White-Box Crypto Gains Traction


Ask any cryptography expert which is better, hardware- or software-based cryptography, and they'll almost always choose the hardware. But as the IoE begins to take root in cost-sensitive markets with tight market windows, that won't always be an option. Plan B is software cryptography, which historically has been used at the application level in the form of anti-virus, anti-spyware, and soft... » read more

Will We Ever Have Just One Remote Control?


The concept of home automation powered by a single remote control has been discussed for decades — at least since the first airing of the Jetsons in 1962. And the tech world has been working fervently to deliver on the concept for just as long. In some respects, we've landed. But there's still much more to explore on the path to a seamless, secure and scalable whole-house connectivity solu... » read more

Flexible Sensors Begin Ramping


Sensors are at the heart of the [getkc id="76" comment="Internet of Things"]. Flexible sensors promise to extend the Internet of Everything to the battlefield, the gymnasium, the hospital, and many other places. Flexible [getkc id="187" kc_name="sensors"] represent the forefront of a sea of change in electronics, marking the transition from rigid semiconductors made with silicon and other ha... » read more

Mobile Edge Computing For The IoE


More attention is being focused on the edges of networks as the IoE begins taking hold. The reason is that the current wireless infrastructure is inadequate for handling the billions of endpoints that will make up the IoE. So for the IoE to realize its full potential, it will either require some sort of add-on infrastructure or a new discovery in physics. Edge networks were not always suc... » read more

Enabling Self-Driving Cars


To enable truly self-driving cars — the ones without a gearshift or a steering wheel — there must be a confluence of technologies, a refinement of the business models, regulatory and safety requirements, and insurance concerns. So how close is the automotive ecosystem to reaching the goal of truly autonomous driving? That depends on your vantage point. As far as where automakers are t... » read more

Securing The Cloud


Cloud computing offers on-demand network access that is ubiquitous and convenient, with a pool of configurable computing resources such as shared networks, servers, storage, applications, and services. What makes this so attractive is these services can be provisioned and adapted to the load, with minimal management or service provider intervention. Cloud computing takes advantage of a distr... » read more

When Cryptographers Disagree


Six of the world's leading cryptography experts sat down this week to explore the most pressing issues in security. They took up topics ranging from whether Apple should facilitate the FBI's access to a known terrorist's iPhone, to what will become the next important cryptography algorithm. Among them: Ronald Rivest, an Institute Professor at MIT; Adi Shamir, co-inventor of the RSA algorithm... » read more

Battle Looms Over Mobile Payments


The lines are drawn. The sides are sizing each other up. Apple is on one side with secure element, and Google and Microsoft are on the other side with host card emulation. Both are mobile payment systems for smartphones that rely on near-field communication technology. Apple fired the first shot with SE, and Google soon replied with HCE. And now both sides are ramping up after months of dela... » read more

Back Doors Are Everywhere


By Ernest Worthman & Ed Sperling Back doors have been a part of chip design since the beginning. One of the first open references was in the 1983 movie "War Games," which features a young computer whiz who uses one to hack into a computer that controls the United States' nuclear arsenal. In reality, modern back doors predate Hollywood's discovery by about 20 years, starting in 1965 wi... » read more

← Older posts Newer posts →