Post-Quantum Computing Threatens Fundamental Transport Protocols


The Transport Level Security (TLS) protocol is one of the few rock-steady spots in the rapidly changing computing industry, but that's about to change as quantum computers threaten traditional encryption schemes. Because TLS is fundamental to network communications, including allowing Internet of Things (IoT) devices to function properly, researchers already are exploring both hardware and s... » read more

Safeguarding IoT Devices With SESIP And PSA Certified Root Of Trust IP


IoT is everywhere. By the end of 2024, it’s forecasted that there will be a staggering 207 billion IoT devices in the world, that’s 25 each for every human being on Earth. The connectivity of IoT devices brings great value for consumers and businesses alike, but with great connectivity comes greater vulnerability to a wide variety of malicious attacks from cyber criminals. IoT devices ar... » read more

Industry Adoption Of Line-Rate Network Security Using MACsec


Network security protocols are the primary means of securing data in motion — that is, data communicated between closely connected physical devices, or between devices, and even virtual machines connected using a complex infrastructure. This article will explore Media Access Control security (MACsec) and how it can be used to provide foundational level network security for a wide range of app... » read more

Securing Short-Range Communications


Short-range wireless communication technology is in widespread use and growing rapidly, adding conveniences for consumers while also opening the door to a whole range of cyberattacks. This technology is common across a variety of applications, from wireless key fobs to unlock a car and start the ignition, to tags used to help drivers find misplaced items such as car keys. RFID also is starti... » read more

Secure Networking Basics: MACsec, IPsec, And SSL/TLS/DTLS


The MACsec, IPsec and SSL/TLS/DTLS protocols are the primary means of securing data in motion (communicated between connected devices). These protocols can be anchored in hardware or implemented in software as part of an end-to-end security architecture. This white paper provides fundamental information on each of these protocols including their interrelationships and use cases. ... » read more

The Week in Review: IoT


Finance Toronto-based Ecobee, which markets smart thermostats, raised $61 million in its Series C funding, bringing the total funding for the 11-year-old company to $146 million. Energy Impact Partners led the new round and was joined by Amazon’s Alexa Fund, Relay Ventures, and Thomvest. Ecobee counts Nest Labs, the Google subsidiary, as its chief rival. ThoughtWire, also headquartered in... » read more

Who’s Responsible For Security?


Semiconductor Engineering sat down to discuss security issues and how to fix them with Mark Schaeffer, senior product marketing manager for secure solutions at Renesas Electronics; Haydn Povey, CTO of Secure Thingz; Marc Canel, vice president of security systems and technologies at [getentity id="22186" comment="Arm"]; Richard Hayton, CTO of Trustonic; Anders Holmberg, director of corporate dev... » read more

Diary Of A Heartbleed


The Heartbleed vulnerability affects how OpenSSL implements the heartbeat protocol in TLS. In computing, a heartbeat, or a simple data message, typically determines the persistence of another machine in a given transaction; in this case, a heartbeat determines the persistence of the encryption between a client and a server. In this case, Heartbleed allows an attacker to request data more than a... » read more

Securing Smart Homes


One year after Mirai malware hijacked more than 100,000 connected devices for its botnet and launched a denial of service attack — which briefly blocked access to popular sites such as Netflix, PayPal, Amazon and Twitter — [getkc id="76" kc_name="IoT"] device makers are just beginning to get smarter about home security. Security concerns reach deeper into the home than just the Internet ... » read more

Internet Security? Not Even Close


This week's outage at Amazon Web Services is yet another reminder that Internet security is still not quite there. Amazon isn't a second-tier cloud services provider. It's one of the biggest cloud companies on the planet. If Amazon can't get it right, it's hard to imagine anyone can. The company's Simple Storage Service, aka S3, was the target, and it took about five hours before this online... » read more

← Older posts