What Are You Going To Do About IoT Security?


We’re almost inured these days to cybercrime—the frequency of the hacks, the incomprehensible scale of compromised accounts, their contents vulture-pecked clean. It’s estimated that cybercrime steals half a trillion dollars each year from the global economy. Much of this is enabled by us as users, succumbing to phishing attacks and just being lazy about good password hygiene. The cybe... » read more

Medical IoT Heats Up


Ever since the IoT was first introduced as a concept, the possibility of using ordinary devices or chips for monitoring health has been mostly an unfulfilled promise. In fact, one of the biggest selling points of smart watches and other wearables initially was the ability to monitor everything from heart irregularities to sugar levels on a continuous basis rather than a once-a-year electroca... » read more

Automotive Cyber Security: From OTA Updates To Anti-Counterfeiting


The National Highway Traffic Administration (NHTSA) defines automotive cyber security as the protection of vehicular electronic systems, communication networks, control algorithms, software, users and underlying data from malicious attacks, damage, unauthorized access, or manipulation. From our perspective, automotive cyber security is one primary concern the industry must immediately addres... » read more

Security For Embedded Electronics


The embedded systems market is expected to enjoy steady growth in the near future—provided those systems can be adequately secured. One of the biggest challenges for embedded devices and systems, especially those employed in the [getkc id="76" comment="Internet of Things"], is adequately protecting them from increasingly sophisticated hacking. This is a new tool for criminal enterprises, a... » read more

Securing Smart Homes


One year after Mirai malware hijacked more than 100,000 connected devices for its botnet and launched a denial of service attack — which briefly blocked access to popular sites such as Netflix, PayPal, Amazon and Twitter — [getkc id="76" kc_name="IoT"] device makers are just beginning to get smarter about home security. Security concerns reach deeper into the home than just the Internet ... » read more

Cyber Security In The Era Of The Smart Home


The global smart home market is projected to reach at least $40 billion in value by 2020. Perhaps not surprisingly, OEMs are inadvertently creating major security risks in their rush to market by shipping smart home products with inadequate security and unpatched vulnerabilities. As ABI Research Analyst Dimitrios Pavlakis notes, ignoring cybersecurity at the design level provides a wide-open do... » read more

Evolution Of The MCU


Microcontrollers are taking on a variety of new and much more complex computing tasks, evolving from standalone chips to more highly integrated devices that can rival complex microprocessors. Microcontroller units (MCUs) are being designed into everything from assisted and autonomous driving to smart cards. They often are the central processing elements for a slew of connected devices that i... » read more

Arm Platform Security Architecture Overview


The transition to an Internet of Things (IoT) is well underway and has the potential to transform both businesses and consumer experiences. The success of this next phase of the internet is heavily dependent upon the trust and security built into billions of different connected devices. Businesses need to depend on the data from edge computing, in order to be able to make commercial decisions, ... » read more

How To Build An IoT Chip (Part 2)


Semiconductor Engineering sat down to discuss IoT chip design issues with Jeff Miller, product marketing manager for electronic design systems in the Deep Submicron Division of [getentity id="22017" e_name="Mentor, a Siemens Business"]; Mike Eftimakis, IoT product manager in [getentity id="22186" e_name="Arm"]'s Systems and Software Group; and John Tinson, vice president of sales at Sondrel Ltd... » read more

Securing High-Value Embedded Targets


Understanding security threats and building solutions to protect against them is a relatively new concept for embedded developers. As an example, many early IoT devices were focused purely on cost. Designers spent very little time architecting robust security solutions. Today, these devices are more involved in users’ daily routines, processing sensitive data such as personal medical informat... » read more

← Older posts Newer posts →