Community



  • TI E2E Community

    TI E2E Community


    Blog Post: Top 3 design challenges that the new generation of SimpleLink™ Wi-Fi® devices will help you overcome
    Published. February 21, 2019

    Have you ever tried to connect your smart Internet-of-Things (IoT) devices to a busy Wi-Fi® network, just to have them rendered useless because the network and bandwidth are ridiculously slow? Many Wi-Fi networks were built using 2.4 GHz, and billions of devices (a number that continues to grow exponentially each year) are now Wi-Fi-enabled. In some instances, wireless networks have become unbearably crowded. This congestion causes a ton of interference that can impact the overall performance...


  • Security Intelligence

    Security Intelligence


    Workplace Expectations and Personal Exceptions: The Social Flaws of Email Security
    Published. February 21, 2019

    While current email security solutions can help mitigate phishing impacts, companies must recognize the role of corporate email as a social network to address the human components of this risk. The post Workplace Expectations and Personal Exceptions: The Social Flaws of Email Security appeared first on Security Intelligence....


  • IEEE Tech Talk Blog

    IEEE Tech Talk Blog


    Circuit Secures the IoT Against Quantum Attack
    Published. February 20, 2019

    MIT engineers design a system for IoT chips to do quantum-computer-proof encryption...


  • Krebs on Security

    Krebs on Security


    A Deep Dive on the Recent Widespread DNS Hijacking Attacks
    Published. February 18, 2019

    The U.S. government — along with a number of leading security companies — recently warned about a series of highly complex and widespread attacks that allowed suspected Iranian hackers to siphon huge volumes of email passwords and other sensitive data from multiple governments and private companies. But to date, the specifics of exactly how that attack went down and who was hit have remained shrouded in secrecy. This post seeks to document the extent of those attacks, and traces the origins...


  • Darktrace

    Darktrace


    Catching Mimikatz’ behavior with anomaly detection
    Published. February 15, 2019

    By empowering security teams to respond before attackers can plunder a network’s entire cache of passwords, AI cyber defenses are thwarting Mimikatz and its copycats alike....


  • MS Security

    MS Security


    How Azure Security Center helps you protect your environment from new vulnerabilities
    Published. February 14, 2019

    Recently the disclosure of a vulnerability (CVE-2019-5736) was announced in the open-source software (OSS) container runtime, runc. This vulnerability can allow an attacker to gain root-level code execution on a "host. runc" which is the underlying container runtime underneath many popular containers....


  • Linux and Open Source

    Linux and Open Source


    Doomsday Docker security hole uncovered
    Published. February 11, 2019

    A security vulnerability has been disclosed for a flaw in runc, Docker and Kubernetes' container runtime, which can be used to attack any host system running containers....


  • SecureRF's IoT Security Blog

    SecureRF's IoT Security Blog


    Will Enterprise Prioritize IoT Security Over Innovation in 2019?
    Published. February 11, 2019

    This month we highlight security issues of concern to both consumers and enterprises, and we also share video from SecureRF’s participation at recent key industry events.   News Six Security Issues Set to Dominate IoT in 2019 The implementation of IoT security is expected to be a top priority for businesses this year, even at… The post Will Enterprise Prioritize IoT Security Over Innovation in 2019? appeared first on SecureRF....


  • All About Microsoft

    All About Microsoft


    How much will staying patched on Windows 7 cost you? Here's the price list
    Published. February 5, 2019

    Large businesses not ready to migrate off Windows 7 as of January 2020 and which opt for paid security updates should expect Microsoft's update pricing to double each year....


  • Security – Beningo Embedded Group


    7 Tips for Getting Started with TrustZone for MCU’s
    Published. November 8, 2018

    The new Armv8-M architecture from arm® with its Cortex®-M23 and Cortex®-M33 processors is quickly gaining steam in the industry. The Armv8-M architecture includes a new security extension known as TrustZone that will revolutionize and forever change the way that embedded software developers create microcontroller-based systems. Below are my top seven tips to help you get … Continue reading 7 Tips for Getting Started with TrustZone for MCU’s...


  • Embedded Basics

    Embedded Basics


    Embedded Basics – The Arm Security Manifesto
    Published. October 27, 2017

    Last week I attended Arm TechCon and a major theme through-out was embedded security. During the conference, Arm released their Security Manifesto which provides developers with Arm’s vision for how the IoT will be protected. Let’s briefly discuss a few highlights. First, I found the Arm Security Manifesto to be an interesting read. The document … Continue reading Embedded Basics – The Arm Security Manifesto...


  • The Linux Foundation

    The Linux Foundation


    The Linux Foundation Welcomes 22 New Members from Cloud, Energy, Security, and Semiconductor Industries
    Published. January 31, 2019

    SAN FRANCISCO – January 31, 2019 – The Linux Foundation, the nonprofit organization enabling mass innovation through open source, announced... The post The Linux Foundation Welcomes 22 New Members from Cloud, Energy, Security, and Semiconductor Industries appeared first on The Linux Foundation....


  • Cloakable

    Cloakable


    Cybersecurity and Medical IoT Devices – Make it Trusted and SIEMple!
    Published. January 29, 2019

    Internet of Medical Things (IoMT) devices are already revolutionizing the healthcare business.  They are delivering on their promises of improved data access, convenience, operational efficiencies and automation for the Health Care Providers (HCP). Additional drivers […]...


  • Cyber Defense

    Cyber Defense


    "Writing Tips for IT Professionals"
    Published. January 25, 2019

        This cheat sheet offers guidelines for IT professionals seeking to improve technical writing skills.To print it, use the one-page PDF version; you can also customize the Word version of the document. Lenny Zeltser, the creatorof this cheat sheet,is the author of SEC402:The Secrets to Successful Cybersecurity Writing: Hack the Reader. Click the link … Continue reading Writing Tips for IT Professionals...


  • Industrial Security

    Industrial Security


    Network Monitoring: Passive, Active or Both
    Published. January 9, 2019

    I recently had the pleasure of addressing the Industrial Control Systems Joint Working Group (ICSJWG) within the U.S. Department of Homeland Security. They invited us to discuss the importance of monitoring industrial networks for comprehensive visibility, as well as present some views on how best to do so. I think that many OT professionals outside of that room—or anyone concerned with industrial cyber security—would also find some value in the topic, so I’d like to offer up a bit of the flavor...


  • Taking Measure

    Taking Measure


    Identify, Protect, Detect, Respond and Recover: The NIST Cybersecurity Framework
    Published. October 23, 2018

    The NIST Cybersecurity Framework consists of standards, guidelines and best practices to manage cybersecurity-related risk. The Framework’s prioritized, flexible, and cost-effective approach helps to promote the protection and resilience of critical infrastructure and other sectors important to the economy and national security. We spoke with Amy Mahn, an international policy specialist in the NIST Applied Cybersecurity Division, about the Framework, who can use it and how it's evolving.   What...


  • Mocana IoT Security Blog

    Mocana IoT Security Blog


    Mocana Enables the Highest Level of IoT Device Authentication Assurance with TPM 2.0 Support
    Published. July 25, 2018

    As the pace of cyber attacks on Internet of Things (IoT) and industrial systems continues to rise, there is a critical need for stronger security on IoT and industrial devices. For the past 15 years, Trusted Platform Module (TPM) technology has been used broadly by major chip vendors such as Intel, AMD, Infineon and others to prove the identity of a computer or financial transaction device....


  • From Silicon to Software

    From Silicon to Software


    Creating IoT Security from Silicon To Software
    Published. September 11, 2018

    Attackers often take advantage of the complexity that comes with balancing greater end-user convenience with traditional security. Behind that cool and responsive interface of an IoT device is millions of lines of code and superfast processing. The weakest link is something basic — a faulty implementation of a protocol, or a lack of a trusted […]...


  • Victor Chertakovsky

    Victor Chertakovsky


    How to Charge Lithium Iron Phosphate Rechargeable Batteries
    Published. September 2, 2018

    Lithium Iron Phosphate batteries are safer than Lithium-ion cells and are available in a range of huge cell sizes between 5 and 100 AH with much longer cycle life than conventional batteries...


  • Electronics Engineering Video Blog

    Electronics Engineering Video Blog


    EEVblog #1110 – Mailbag
    Published. August 9, 2018

    More than an hour of Mailbag! Forum HERE SPOILERS: Sony DVO-1000MD medical device video DVD recorder teardown 8:09 Security ISA card teardown from the 1980’s 18:39 Power Grid the board game! 25:02 USB soldering iron 27:21 TI-nSpire CAS+ calculator PROTOTYPE! 35:28 DIY JBC/Hakko soldering iron controller 41:49 UV LED lamp for PCB exposure 45:10 DIY ......


  • Stephane Boucher's DSP Blog

    Stephane Boucher's DSP Blog


    Elliptic Curve Cryptography
    Published. November 16, 2015

    Secure online communications require encryption.  One standard is AES (Advanced Encryption Standard) from NIST.  But for this to work, both sides need the same key for encryption and decryption.  This is called Private Key encryption.  Public Key encryption is used to create a private key between two sides that have not previously communicated.  Compared to the history......


  • Industrial Control Systems Security

    Industrial Control Systems Security


    "Preparing for Cyber Security Incidents"
    Published. September 26, 2017

    This blog post was written by ICS515 instructor,Kai Thomsen. Talk with any incident responder and you'll learn that there are a few less glamorous parts of the job. Writing the final report and preparation in advance to an incident are probably top contenders. In this article I want to focus on preparation and explain to … Continue reading Preparing for Cyber Security Incidents...


  • Tech Design Forums Blog

    Tech Design Forums Blog


    Holistic verification change needed for self-driving cars
    Published. June 19, 2018

    Verification of the coming generation of highly autonomous vehicles needs says Peter Davies, director of security concepts at Thales....


  • Verification Horizons Blog

    Verification Horizons Blog


    Accellera Proposes a New Working Group
    Published. April 6, 2018

    Accellera to explore the need for an IP Security Assurance Standard In the era of SoC design where major design intellectual property (IP) blocks come from multiple sources and are combined to create an SoC or major block to be incorporated into yet another SoC, how can one test such systems to ensure they are […]...


  • Gabe On EDA

    Gabe On EDA


    ARM TechCon Report on IoT, Automotive, and Security
    Published. November 1, 2017

    ARM TechCon Report on IoT, Automotive, and Security Gabe Moretti Wed, 11/01/2017 - 07:58...


  • scalability.org

    scalability.org


    Disk, SSD, NVMe preparation tools cleaned up and on GitHub
    Published. September 14, 2017

    These are a collection of (MIT licensed) tools I’ve been working on for years to automate some of the major functionality one needs when setting up/using new machines with lots of disks/SSD/NVMe. The repo is here: https://github.com/joelandman/disk_test_setup . I will be adding some sas secure erase and formatting tools into this. These tools wrap other […]...


  • Functional Verification Blog

    Functional Verification Blog


    Sign Up For Free Verification Sessions -- Only A Few Days Left
    Published. July 19, 2010

    Mark your calendar and sign up for the two upcoming free verification sessions sponsored by Cadence. Space is limited. So, please sign up today! JULY 21 st All-Day, Hands-on technical workshop in Irvine, CA Topic: Advanced Verification Techniques using e /SV Workshop Learn how to architect an advanced testbench using OVM/UVM that contains generation, coverage and checking and much, much more..... This workshop will focus on introducing attendees to advanced verification techniques using the latest...


  • Electrical Engineers  Talk Tech

    Electrical Engineers Talk Tech


    Does Secure Erase Actually Work?
    Published. July 18, 2016

    Chris A. Ciufo, Editor, Embedded Systems Engineering In this Part 2 of 2, I examine the subject of using the flash manufacturer’s secure erase feature—since so many DoD documents recommend it. In Part 1 of this blog (“How Does One … Continue reading →...


  • Rands In Repose

    Rands In Repose


    Turn on 2FA before it’s too late
    Published. July 17, 2016

    Two-factor authentication (“2FA”) is intended as another layer of security to your online accounts, so if your password is hacked, your account can’t be accessed without a special code. While I clearly understand the value, I’ve been lazy about enabling on various services since… it’s a hassle. I’ve only enabled it when I’ve been required… More#...


  • Ed Burnette's Dev Connection

    Ed Burnette's Dev Connection


    More Android malware FUD is the only thing that is sprouting
    Published. August 8, 2012

    Yesterday, ZDNet's Rachel King picked up a malware story from security vendor Webroot. Now questions have arisen about the accuracy of the article, and the tactics and credibility of the vendor....


  • Laptops and Desktops Blog

    Laptops and Desktops Blog


    Fujitsu adds Intel Broadwell processors to new enterprise tablets, laptops
    Published. January 28, 2015

    The mobile devices include a pair of Ultrabooks and feature optional palm-based biometric security features....



Share and Enjoy:
  • Digg
  • Sphinn
  • del.icio.us
  • Facebook
  • Mixx
  • Google
Extension Media websites place cookies on your device to give you the best user experience. By using our websites, you agree to placement of these cookies and to our Privacy Policy. Please click here to accept.