Connect with us
NEW INDUSTRY PRODUCTS
CIRCUITS & PROJECTS
EMBEDDED & MICRO
Test Equipment DB
LOG IN / JOIN
Sign in with
Sign in with
Security / Identification
Security / Identification News
Test & Measurement
Does the IoT Need Oversight? UK Introduces “Code of Practice” of Cybersecurity for IoT Developers
The British government recently released a "Code of Practice" for IoT device developers to responsibly design secure devices. Is this list of best practices a precursor to regulation? Should it be?...
October 22, 2018
Engineering Spotlight: Todd Ouska, wolfSSL’s Chief Technology Officer, on TLS 1.3
The importance of security in embedded systems is growing, making wolfSSL's Todd Ouska’s line of work a hot topic. AAC’s Chantelle Dubois had a chance to speak with him about his career and...
October 12, 2018
BrainChip to Release Biologically Inspired Neurmorphic System-on-a-Chip for AI Acceleration
BrainChip has announced the Akida Neuromorphic System-on-Chip (NSoC), the first production-volume artificial intelligence accelerator utilizing Spiking Neural Networks (SNN)....
September 12, 2018
What You Need to Know About the TLS 1.3 Protocol and wolfSSL’s SSL/TLS Libraries
Security protocols, like communication protocols, are currently in competition to set industry-wide standards. What is the TLS 1.3 protocol? How does this security protocol differ from SSL?...
September 10, 2018
ASICs Wanted: The BM1387 and the Hardware Designed for Cryptocurrency Mining
Cryptocurrencies have been in and out of the news for a while now. Because "mining" is the only source of new cryptocurrency units, complex ASIC devices such as the BM1387 have been created to...
August 02, 2018
The Quantum Race: Roundup on Quantum Cryptosecurity, Programming Languages, and Development
The space race of the cold war saw the US and Russia develop a wide range of aerospace technologies. But a new race is about to begin, mostly among corporations, and the winner will unlock the...
July 31, 2018
What Is an eSIM? The Pros, Cons, and Seeming Inevitability of Embedded SIM ICs
STMicroelectronics announced in June that it is the world's first eSIM manufacturer accredited by the GSMA to personalize eSIMs for mobile and connected IoT devices. What is an eSIM? How could...
July 16, 2018
More Accurate and Secure Asset Tracking: Trends in Cellular and Indoor Location Technology
Here's a look at recent technologies released by PoLTE and decaWave, which provide indoor location services, and Telit, which provides cellular modules with a global reach....
July 12, 2018
wolfMQTT Client Library Adds End-to-End Encryption for M2M and IoT
WolfSSL recently released the wolfMQTT client library, a security add-on that provides SSL/TLS encryption for the Message Queuing Telemetry Transport (MQTT) protocol....
July 03, 2018
How NFC (Near Field Communication) Is Changing Our Mobile Life
Here’s a look at some of the ways NFC is already being used on your smartphone.
June 05, 2018
Microsoft Experiment Looks Into the 7 Properties of Highly Secured Devices for IoT
A team from the Microsoft Research New Experiences and Technologies (NExT) Operating Systems Group has been working on methods to introduce high level security in IoT microcontrollers, coming...
March 29, 2018
MIT’s Encryption Chip Reduces Public-Key Encryption Power Consumption by 99.75%
Encryption takes energy. MIT's public-key encryption chip reportedly reduces encryption energy consumption by 99.75%.
March 28, 2018
MOSQUITO Attack Uses Headphones, Speakers, and Microphones to Leak Data Over Ultrasonic Frequencies
A cybersecurity research group in Israel has recently published a paper in which they describe the MOSQUITO attack—an attack that can reverse speakers and microphones in air-gapped computers,...
March 20, 2018
NXP and Microsoft Collaborations Focus on Enhancing IoT Security
NXP Semiconductors, a Dutch manufacturer of semiconductor chips and SoCs, has recently announced a few new collaborations with Microsoft that will enhance Industrial IoT applications with...
March 18, 2018
DeepCover: Maxim Integrated’s Secure Authenticator with a Host of Security Services
Maxim Integrated recently announced the DS28E36 IC, which is a secure authenticator that uses Maxim's DeepCover embedded security solutions....
February 23, 2018
Teardown Tuesday: Keyless Entry Door Lock
In this teardown, we unlock an electronic touchpad keyless entry door lock system to learn some of its secrets.
February 13, 2018
Anatomy of a Security Flaw Announcement: The Strange Timeline of Spectre and Meltdown
Here's a look at the unusual way Meltdown and Spectre were revealed to the public and what we can expect going forward.
January 15, 2018
What’s So Cool About Crypto Cold Storage? A Look at Blockchain Wallets
Even if you are not interested in cryptocurrencies or blockchain technology, the hardware and systems available to keep these things safe are still interesting and relevant for data security...
January 07, 2018
What Can Hackers Learn from Your Device’s Emissions? How Side Channel Attacks Thwart Cybersecurity
Side channel attacks can be used in a variety of ways to take advantage of unintended acoustic, mechanical, and electromagnetic signals to recreate data....
December 08, 2017
Breaking the System to Fix It: The “Hackers” That Hunt for Security Vulnerabilities
Sometimes the people trying to hack your devices are an important part of the security echo system.
November 25, 2017
Page 1 of 4
Next Page →
Continue to site