Different Approaches To Security


Everyone acknowledges the necessity for cybersecurity precautions, yet the world continues to be challenged by an invisible, inventive army of hackers. The massive data breach at Equifax was only the latest in a series of successful cyberattacks on the credit monitoring firm. Lessons learned from the previous breaches apparently didn’t mitigate this year’s embarrassment for the company. ... » read more

The Week In Review: Design


IP Cryptographic flaws have been discovered in the IEEE P1735 standard for encrypting IP and managing access rights. A team from the University of Florida found "a surprising number of cryptographic mistakes in the standard. In the most egregious cases, these mistakes enable attack vectors that allow us to recover the entire underlying plaintext IP." The researchers warn that an adversary coul... » read more

What Are You Going To Do About IoT Security?


We’re almost inured these days to cybercrime—the frequency of the hacks, the incomprehensible scale of compromised accounts, their contents vulture-pecked clean. It’s estimated that cybercrime steals half a trillion dollars each year from the global economy. Much of this is enabled by us as users, succumbing to phishing attacks and just being lazy about good password hygiene. The cybe... » read more

Medical IoT Heats Up


Ever since the IoT was first introduced as a concept, the possibility of using ordinary devices or chips for monitoring health has been mostly an unfulfilled promise. In fact, one of the biggest selling points of smart watches and other wearables initially was the ability to monitor everything from heart irregularities to sugar levels on a continuous basis rather than a once-a-year electroca... » read more

Automotive Cyber Security: From OTA Updates To Anti-Counterfeiting


The National Highway Traffic Administration (NHTSA) defines automotive cyber security as the protection of vehicular electronic systems, communication networks, control algorithms, software, users and underlying data from malicious attacks, damage, unauthorized access, or manipulation. From our perspective, automotive cyber security is one primary concern the industry must immediately addres... » read more

Security For Embedded Electronics


The embedded systems market is expected to enjoy steady growth in the near future—provided those systems can be adequately secured. One of the biggest challenges for embedded devices and systems, especially those employed in the [getkc id="76" comment="Internet of Things"], is adequately protecting them from increasingly sophisticated hacking. This is a new tool for criminal enterprises, a... » read more

Securing Smart Homes


One year after Mirai malware hijacked more than 100,000 connected devices for its botnet and launched a denial of service attack — which briefly blocked access to popular sites such as Netflix, PayPal, Amazon and Twitter — [getkc id="76" kc_name="IoT"] device makers are just beginning to get smarter about home security. Security concerns reach deeper into the home than just the Internet ... » read more

Cyber Security In The Era Of The Smart Home


The global smart home market is projected to reach at least $40 billion in value by 2020. Perhaps not surprisingly, OEMs are inadvertently creating major security risks in their rush to market by shipping smart home products with inadequate security and unpatched vulnerabilities. As ABI Research Analyst Dimitrios Pavlakis notes, ignoring cybersecurity at the design level provides a wide-open do... » read more

Evolution Of The MCU


Microcontrollers are taking on a variety of new and much more complex computing tasks, evolving from standalone chips to more highly integrated devices that can rival complex microprocessors. Microcontroller units (MCUs) are being designed into everything from assisted and autonomous driving to smart cards. They often are the central processing elements for a slew of connected devices that i... » read more

Arm Platform Security Architecture Overview


The transition to an Internet of Things (IoT) is well underway and has the potential to transform both businesses and consumer experiences. The success of this next phase of the internet is heavily dependent upon the trust and security built into billions of different connected devices. Businesses need to depend on the data from edge computing, in order to be able to make commercial decisions, ... » read more

← Older posts Newer posts →