Special Report
Back Doors Are Everywhere
Despite fears about hardware breaches, access to firmware and chip data is more common than you would expect.
Top Stories
Securing The Cloud
The cloud presents a variety of unique challenges for data security, including some from the inside.
When Cryptographers Disagree
From Apple to algorithms, here’s what concerns the top cyber experts.
Battle Looms Over Mobile Payments
Host card emulation and secure element are vying for the instant payment market. Much is at stake.
Blogs
Editor in Chief Ed Sperling contends that hardware engineers should take note of the skyrocketing number of cyberattacks, in The Price Of Fear.
Technology Editor Ernest Worthman questions Apple’s claims about protecting the privacy of iPhone customers in its battle with the FBI, in Oh, The Hypocrisy.
Executive Editor Ann Steffora Mutschler questions what will be lost in our quest for safer cars, in Safe But Boring.
Kilopass’ Lee Sun digs into what comes after EEPROM and NOR flash and why it’s so critical, in Industrial Electronics Gain Greater Flexibility With Embedded Memory.
Mentor Graphics’ Warren Kurisu observes that a much more comprehensive security strategy is required as more devices are connected, in Is Your IoT Network Just Another Playground For Hackers?
Sponsor White Paper
Developing Effective Design Strategies For Today’s Wearable Devices: Security
Part 3: Why security needs to be considered from the outset.