Connect with us
NEW INDUSTRY PRODUCTS
CIRCUITS & PROJECTS
EMBEDDED & MICRO
Test Equipment DB
LOG IN / JOIN
Sign in with
Sign in with
Security / Identification
Security / Identification News
Test & Measurement
Can Near Field Communication Be Secure In the IoT? NXP’s New NFC Tag Aims For Highest Security
Despite security fears, RFID and NFC use is growing. NXP aims to make NFC more secure with its NTAG 424 DNA.
March 16, 2019
Is SSH Security the Future of Embedded Devices? A Talk with wolfSSL Senior Engineer, John Safranek
AAC had a chance to talk with senior engineer, John Safranek, about wolfSSH, elliptic curve cryptography, and embedded security.
March 06, 2019
Arm Releases New Infrastructure and Security Certifications for IoT Devices
Arm's new security certifications and IoT infrastructure platforms plan for one trillion connected devices.
February 25, 2019
Hardware-Based Security and a Dev Kit for Alexa: A Look at Microchip Technology at CES 2019
Catch up on what Microchip released at CES this year and which trends they're focusing on for 2019.
January 16, 2019
Internet of Things, 5G, and Cybersecurity Dominate CES 2019
A quick look at the IoT developments from this year's Consumer Electronics Show in Las Vegas.
January 10, 2019
Does the IoT Need Oversight? UK Introduces “Code of Practice” of Cybersecurity for IoT Developers
The British government recently released a "Code of Practice" for IoT device developers to responsibly design secure devices. Is this list of best practices a precursor to regulation? Should it...
October 22, 2018
Engineering Spotlight: Todd Ouska, wolfSSL’s Chief Technology Officer, on TLS 1.3
The importance of security in embedded systems is growing, making wolfSSL's Todd Ouska’s line of work a hot topic. AAC’s Chantelle Dubois had a chance to speak with him about his career and...
October 12, 2018
BrainChip to Release Biologically Inspired Neurmorphic System-on-a-Chip for AI Acceleration
BrainChip has announced the Akida Neuromorphic System-on-Chip (NSoC), the first production-volume artificial intelligence accelerator utilizing Spiking Neural Networks (SNN)....
September 12, 2018
What You Need to Know About the TLS 1.3 Protocol and wolfSSL’s SSL/TLS Libraries
Security protocols, like communication protocols, are currently in competition to set industry-wide standards. What is the TLS 1.3 protocol? How does this security protocol differ from SSL?...
September 10, 2018
ASICs Wanted: The BM1387 and the Hardware Designed for Cryptocurrency Mining
Cryptocurrencies have been in and out of the news for a while now. Because "mining" is the only source of new cryptocurrency units, complex ASIC devices such as the BM1387 have been created to...
August 02, 2018
The Quantum Race: Roundup on Quantum Cryptosecurity, Programming Languages, and Development
The space race of the cold war saw the US and Russia develop a wide range of aerospace technologies. But a new race is about to begin, mostly among corporations, and the winner will unlock the...
July 31, 2018
What Is an eSIM? The Pros, Cons, and Seeming Inevitability of Embedded SIM ICs
STMicroelectronics announced in June that it is the world's first eSIM manufacturer accredited by the GSMA to personalize eSIMs for mobile and connected IoT devices. What is an eSIM? How could...
July 16, 2018
More Accurate and Secure Asset Tracking: Trends in Cellular and Indoor Location Technology
Here's a look at recent technologies released by PoLTE and decaWave, which provide indoor location services, and Telit, which provides cellular modules with a global reach....
July 12, 2018
wolfMQTT Client Library Adds End-to-End Encryption for M2M and IoT
WolfSSL recently released the wolfMQTT client library, a security add-on that provides SSL/TLS encryption for the Message Queuing Telemetry Transport (MQTT) protocol....
July 03, 2018
How NFC (Near Field Communication) Is Changing Our Mobile Life
Here’s a look at some of the ways NFC is already being used on your smartphone.
June 05, 2018
Microsoft Experiment Looks Into the 7 Properties of Highly Secured Devices for IoT
A team from the Microsoft Research New Experiences and Technologies (NExT) Operating Systems Group has been working on methods to introduce high level security in IoT microcontrollers, coming...
March 29, 2018
MIT’s Encryption Chip Reduces Public-Key Encryption Power Consumption by 99.75%
Encryption takes energy. MIT's public-key encryption chip reportedly reduces encryption energy consumption by 99.75%.
March 28, 2018
MOSQUITO Attack Uses Headphones, Speakers, and Microphones to Leak Data Over Ultrasonic Frequencies
A cybersecurity research group in Israel has recently published a paper in which they describe the MOSQUITO attack—an attack that can reverse speakers and microphones in air-gapped computers,...
March 20, 2018
NXP and Microsoft Collaborations Focus on Enhancing IoT Security
NXP Semiconductors, a Dutch manufacturer of semiconductor chips and SoCs, has recently announced a few new collaborations with Microsoft that will enhance Industrial IoT applications with...
March 18, 2018
DeepCover: Maxim Integrated’s Secure Authenticator with a Host of Security Services
Maxim Integrated recently announced the DS28E36 IC, which is a secure authenticator that uses Maxim's DeepCover embedded security solutions....
February 23, 2018
Page 1 of 4
Next Page →
Continue to site