Forgotten Essence Of The Backend Penetration Testing


At Riscure we have observed many severe security issues exploited by hackers even in previously certified solutions. In recent years, certification, which aims to minimize security risks, has become more important, especially in the mobile application industry. However, certification compliance is sometimes still not sufficient. This is especially noticeable when the solution’s functionality ... » read more

Tech Talk: Mobile Security (Part 2)


Simon Blake Wilson of Rambus' Cryptography Research Division talks about where security needs to fit into the design flow and where the biggest risks are. To view part one of this video, click here. [youtube vid=_nnniakpP3M] » read more

Blog Review: Jan. 14


Ansys' Bill Vandermark flags the top five engineering technology articles for the week, leaning heavily on CES. The 3D scanner is intriguing because of the link to 3D printing. Mentor's Robin Bornoff returns to the drawing board to design a better water heater. Unfortunately, you probably won't be able to find one of these in your local Home Depot—ever. eSilicon's Jack Harding defines w... » read more

Securing The IoT


Semiconductor Engineering sat down to discuss whether the [getkc id="76" comment="Internet of Things"] will be secure enough, or whether it will create new security issues, with Sami Nassar, general manager of [getentity id="22499" comment="NXP Semiconductor"]; Oleg Logvinov, director for special assignments at [getentity id="22331" comment="STMicroelectronics"]; and Lawrence Loh, application e... » read more

Hiding The Electronic Crumbs


Imagine an old Western movie where the posse tracks the outlaws by following footsteps on a dirt trail or looking for broken branches. Now fast forward to the present, where the trail is electronic, the posse is comprised of bad guys, and the loot is frequently encrypted. As any security expert will concede, every security system can be compromised, every chip can be reverse engineered and h... » read more