2020-04-07 - Junko Yoshida

Securing API to Protect Your Car-Key Apps

There are too many ways to hack the API of a car-key app. CriticalBlue has a solution for that...

2020-03-31 - George Leopold

U.S. Election Integrity Creates Unease

US election infrastructure is antiquated and vulnerable. Can we fix it before the 2020 presidential election?

2020-03-25 - Nitin Dahad and Maurizio Di Paolo Emilio

Securing IoT With PUF Technology

Several chip vendors are implementing physically unclonable functions (PUF) to enable security in IoT devices; we looked at two of…

2020-03-23 - M. Di Paolo Emilio

IoT Design Gets Smart and Secure Embedded Solutions

Microchip has launched a range of IoT solutions for rapid prototyping by using cloud connectivity for all integrated microcontroller solutions.

2020-03-12 - Junko Yoshida

More Apps for ‘Digital’ Car Keys

NXP's “automotive digital key solution” enables smartphones, key fobs and other devices to securely communicate, store, authenticate and share digital…

2020-03-06 - John Walko

Huawei: UK Carriers to Be Hit by Clampdown

Strict limits on Huawei gear appears to be an opportunity for Nokia and Ericsson, but they put BT, Vodaphone, and…

2020-03-05 - Ann R. Thryft

Blog: Frailties of LoRaWAN IoT Devices

Probably not very. Simply configuring LoRaWAN security keys is inadequate for preventing IoT devices from being hacked.

2020-03-04 - Nitin Dahad

Beating Facial Recognition Cheats

Trinamax's technology can identify any material, including live skin. It should be in Qualcomm smartphones in 2021.

2020-02-27 - Ann R. Thryft

Unsupported and Unpatched

Vulnerable to attack, older Windows systems present modern challenges to OT network managers.

2020-02-27 - Nirav Shah, Fortinet

Hyperscale is in Need of Security Processors

Without purpose-built security processors, organizations that rely on digital innovation are left with either slowing down to accommodate security limitations,…