To Bolster IoT Security, Think Holistically


On Friday Oct. 21, a new phrase captured the public’s imagination: “script kiddie.” That’s what security experts suspect was at work when a denial-of-service attack slipped in through thousands of security cameras and home entertainment devices and brought much of the Internet to its knees. If you’re not familiar with the term, “script kiddie” refers to an unskilled person who ... » read more

Can Low-Power Devices Be Secure?


Successfully designing a low-power, high-performance chip design is an accomplishment, but effectively implementing cybersecurity in such devices makes it much more difficult. Safety, particularly functional safety for automotive and military/aerospace applications, also can be a prime concern in creating low-power, high-performance integrated circuits and systems. When combined with securit... » read more

What’s Next For IoT Security?


By Ed Sperling & Jeff Dorsch With security, the little things can cause as much of a problem as the big things. As shown in the recent distributed denial of service attack (DDoS) on Dyn, which created waves of attacks using Mirai malware, connected devices of all sizes can be amassed into an army of bots that can bring even giants like Amazon and Netflix to a dead stop. This attack was ... » read more

Is Security All Talk?


Security is the No. 1 recurring theme at conferences these days. And given the explosion in the number of conferences this year—up to a half dozen some weeks just in Silicon Valley—that's a lot of attention being showered on security. At nearly all of these talks, there is at least a mention about recent breaches, pervasive and persistent risks, and the growing threat level. The topic of... » read more

Will 5G Enable Connected Cars?


As the telecom, automotive and semiconductor ecosystems rally to develop solutions for next-generation mobile networks for the connected car, 5G technology has emerged as a strong contender. Fifth-generation mobile networks will enable data transmission rates of more than 10Gps, connecting machines to machines, as well as everything else, including smartphones, IoT devices that require a... » read more

Dyn DDoS Attack Reboots IoT Security


In mid-October, cyber criminals targeted Internet infrastructure company Dyn with a “massive and sustained” DDoS attack that focused on the company’s DNS infrastructure. The cyber offensive disrupted access to a number of major sites including Twitter, Amazon, Tumblr, Reddit, Spotify and Netflix. Perhaps not surprisingly, the massive DDoS attack was conducted with the help of various hija... » read more

Fingerprint Sensor Technology And Security Requirements


Biometrics is a technology that uses a human’s biological features, such as facial characteristics, fingerprint patterns, retina, DNA or behaviors (voice and signature) to authenticate a person’s identification and authorize specific actions. Of all of them, fingerprint analysis technology is the most mature and has the widest acceptance. Several factors contribute to fingerprint technol... » read more

Security Becomes A Multi-System Issue


The fallout from the Mirai malware attack last week was surprising, given that it was published on the Internet several months ago as open-source. Despite numerous warnings, it still managed to cause denial of service attacks at Amazon, Netflix, and a slew of other companies that are supposed to be able to fend off these kinds of attacks. The good news is that it more people talking about th... » read more

IoT – And A Tear In The Fabric Of The Connected World


Billions of connected things. Massive silicon consumption. Exponentially rising data volumes. Global compute farm build-out to make sense out of all of it. Lots of dollar signs. Everyone is talking about IoT with an optimistic view toward the future. There is a dark side to all this. Many, including yours truly have written about it. If you’re familiar with the Terminator series, you can call... » read more

Overcoming The Limits Of Scaling


Semiconductor Engineering sat down to discuss the increasing reliance on architectural choices for improvements in power, performance and area, with [getperson id="11425" comment=" Sundari Mitra"], CEO of [getentity id="22535" comment="NetSpeed Systems"]; Charlie Janac, chairman and CEO of [getentity id="22674" e_name="Arteris"]; [getperson id="11032" comment="Simon Davidmann"] CEO of [getentit... » read more

← Older posts Newer posts →