Forgotten Essence Of The Backend Penetration Testing


At Riscure we have observed many severe security issues exploited by hackers even in previously certified solutions. In recent years, certification, which aims to minimize security risks, has become more important, especially in the mobile application industry. However, certification compliance is sometimes still not sufficient. This is especially noticeable when the solution’s functionality ... » read more

Week In Review: Auto, Security, Pervasive Computing


Pervasive computing Keysight Technologies introduced its new Electrical Performance Scan (EP-Scan), a high-speed digital simulation tool for rapid signal integrity (SI) analysis for hardware engineers and printed circuit board (PCB) designers. Siemens Digital Industries Software announced the opening of its eXplore Live at The Smart Factory @ Wichita, housed at Wichita State University’... » read more

Blog Review: Jan. 18


Synopsys' Dana Neustadter, Sara Zafar Jafarzadeh, and Ruud Derwig argue that we are already at an inflection point for post-quantum security because devices and infrastructure systems with longer life cycles or communicating data that must be kept confidential for an extended period need to have a path towards quantum-safe solutions. Siemens EDA's Harry Foster looks at trends in adoption of ... » read more

EV Architectures Evolving For Communication, Connectivity


Electric vehicle architectures are rapidly evolving to accommodate multiple forms of connectivity, including in-vehicle, vehicle-to-vehicle, and vehicle-to-infrastructure communication. But so far, automotive OEMs have yet to come to a consensus on the winning technologies or the necessary standards — all of which will be necessary as cars become increasingly autonomous and increasingly inter... » read more

Shifting Toward Software-Defined Vehicles


Apple reportedly is developing a software-defined vehicle. But so are Renault, Hyundai, General Motors, and just about everyone else. Some of the benefits of SDVs include increased comfort, convenience, safety, reliability, and remote software and firmware updates. Preventive and predictive maintenance, and remote diagnostics, can be done more conveniently over the air, while vehicle behavio... » read more

How Secure Are RISC-V Chips?


When the Meltdown and Spectre vulnerabilities were first uncovered in 2018, they heralded an industry-wide shift in perspective regarding processor security. As the IBM X-Force Threat Intelligence Index put it the following year, "2018 ushered in a new era of hardware security challenges that forced enterprises and the security community to rethink the way they approach hardware security." R... » read more

Security Highlight: Compromising Printers Via Malicious Third-Party Cartridges


This fall, HP Inc. published an article describing a buffer overflow vulnerability in their printer software which would allow an attacker to obtain persistent remote code execution on the printer. Buffer overflow vulnerabilities are common, but what makes this one noteworthy is that it can be exploited remotely by a malicious third-party printer cartridge. In the printer ecosystem, there ... » read more

RISC-V Pushes Into The Mainstream


RISC-V cores are beginning to show up in heterogeneous SoCs and packages, shifting from one-off standalone designs toward mainstream applications where they are used for everything from accelerators and extra processing cores to security applications. These changes are subtle but significant. They point to a growing acceptance that chips or chiplets based on an open-source instruction set ar... » read more

Blog Review: Dec. 14


Siemens EDA's Harry Foster checks out design and verification language adoption trends in FPGA projects, including testbench methodologies and assertion languages. Cadence's Veena Parthan finds that giving electric vehicle batteries a second life as energy storage devices can extend their useful life by 5 to 8 years, but a lack of standardization in EV batteries poses challenges. Synopsys... » read more

Week In Review: Auto, Security, Pervasive Computing


Automotive, Mobility The U.S. space agency NASA entered a $57.2 million contract with ICON to develop technology to build roads on the moon. ICON, a Texas-based 3D printing construction company, has been working with NASA and the U.S. Air Force on construction technologies that can use local materials to build infrastructure on Mars. NASA is working on advanced 3D printing construction systems... » read more

← Older posts Newer posts →