Community



  • Krebs on Security

    Krebs on Security


    First American Financial Corp. Leaked Hundreds of Millions of Title Insurance Records
    Published. May 24, 2019

    The Web site for Fortune 500 real estate title insurance giant First American Financial Corp. [NYSE:FAF] leaked hundreds of millions of documents related to mortgage deals going back to 2003, until notified this week by KrebsOnSecurity. The digitized records -- including bank account numbers and statements, mortgage and tax records, Social Security numbers, wire transaction receipts, and drivers license images -- were available without authentication to anyone with a Web browser....


  • Security Intelligence

    Security Intelligence


    Secure Your Hybrid Cloud Environment With Visibility, Control and Flexibility
    Published. May 24, 2019

    When it is implemented correctly, hybrid cloud data protection enables organizations to safeguard critical data across their choice of on-premises, public and/or private cloud services. The post Secure Your Hybrid Cloud Environment With Visibility, Control and Flexibility appeared first on Security Intelligence....


  • Mocana IoT Security Blog

    Mocana IoT Security Blog


    Why Cybersecurity Matters When Targeting a New Market
    Published. May 23, 2019

    https://www.mocana.com/trust-platform...


  • Verification Horizons Blog

    Verification Horizons Blog


    Mitigating Security Risks When Designing with 3rd-Party Silicon IP
    Published. May 14, 2019

    Accellera DAC Panel to Discuss There is probably not one embedded system that is not built without open source software, 3rd party silicon IP or manufactured far from the design and distribution centers that make and sell these systems.  Those who want to secure the design and delivery chain have no standard to use to […]...


  • IEEE Tech Talk Blog

    IEEE Tech Talk Blog


    Digital Doppelgängers Fool Advanced Anti-fraud Tech
    Published. May 15, 2019

    With traces of a user’s browsing history and online behavior, hackers can build a fake virtual “twin” and use it to log in to a victim’s accounts...


  • Linux and Open Source

    Linux and Open Source


    Linux vs. Zombieload
    Published. May 14, 2019

    Zombieload, another Intel processor side-channel attack, just like Meltdown and Spectre before it, poses a security threat for Linux systems....


  • MS Security

    MS Security


    Azure Firewall and network virtual appliances
    Published. May 14, 2019

    Network security solutions can be delivered as appliances on premises, as Network Virtual Appliances (NVAs) that run in the cloud or as a cloud native offering (known as firewall-as-a-service)....


  • Tech Design Forums Blog

    Tech Design Forums Blog


    Security, machine learning, and variety at DAC
    Published. May 13, 2019

    Security and machine learning are two topics that take center stage at DAC this year, says the conference’s general chair Rob Aitken....


  • SecureRF's IoT Security Blog

    SecureRF's IoT Security Blog


    Upcoming Events
    Published. May 13, 2019

    The SecureRF team is on the road this spring at the SiFive Symposia, IOT World, Bay Area RISC-V Meetup, ETSI Security Week and the GSA Silicon Summit. Come visit us at one of our upcoming events. The post Upcoming Events appeared first on SecureRF....


  • Industrial Control Systems Security

    Industrial Control Systems Security


    "7 Tips For Planning ICS Plant Visits"
    Published. May 6, 2019

    As you plan the next visit to your ICS plant(s) with your security team, consider these seven tips. They will maximize time on-site for accurate asset identification, effective cybersecurity awareness that will foster IT and OT relationships for smooth ICS incident response, and highlight new ways to ethically hack your digital and physical security perimeter. … Continue reading 7 Tips For Planning ICS Plant Visits...


  • The Human OS

    The Human OS


    Korea's New 5G Futuristic Hospital
    Published. May 3, 2019

    Hologram visitors, indoor navigation, facial recognition security, and voice-controlled rooms are coming to a hospital in South Korea...


  • From Silicon to Software

    From Silicon to Software


    Creating IoT Security from Silicon To Software
    Published. September 11, 2018

    Attackers often take advantage of the complexity that comes with balancing greater end-user convenience with traditional security. Behind that cool and responsive interface of an IoT device is millions of lines of code and superfast processing. The weakest link is something basic — a faulty implementation of a protocol, or a lack of a trusted security zone on a chip. Exploitation, in either case, requires very little skill. Thus, a lot of the attacks today are carried out not by criminals with...


  • Industrial Security

    Industrial Security


    What are CISOs and what do they do?
    Published. April 23, 2019

    Slowly but surely, the role of cyber security is increasing in importance in industrial and manufacturing organizations of all kinds. One key bit of proof is the growing number of Chief Information Security Officers—CISOs—being appointed to corporate C-Suites. While there was once no professional assigned to cyber security in most organizations, over the years the role had evolved to a management level position such as “Information Security Manager” in many places. Now, we are seeing the...


  • Darktrace

    Darktrace


    Software as a Security nightmare: The risks of collaboration on the cloud
    Published. April 23, 2019

    The efficiencies promised by SaaS need not come at the cost of security, since the latest AI cyber defenses shine a light on even the most nebulous traffic in the cloud....


  • The Linux Foundation

    The Linux Foundation


    Xen Project Hypervisor 4.12 Offers Smaller Code Size and Improved Security
    Published. April 2, 2019

    Major release makes Xen an attractive option for automotive and embedded technologies. SAN FRANCISCO – April 2, 2019 — The... The post Xen Project Hypervisor 4.12 Offers Smaller Code Size and Improved Security appeared first on The Linux Foundation....


  • All About Microsoft

    All About Microsoft


    Some Windows 7, 8.1 users reporting Security Essentials and Windows Defender problems
    Published. March 19, 2019

    Some Windows 7 and 8.1 users are noticing that their automatic anti-malware protection has been turned off and are seeing out-of-date virus definitions. A definition update fix is available now....


  • Security – Beningo Embedded Group


    7 Tips for Getting Started with TrustZone for MCU’s
    Published. November 8, 2018

    The new Armv8-M architecture from arm® with its Cortex®-M23 and Cortex®-M33 processors is quickly gaining steam in the industry. The Armv8-M architecture includes a new security extension known as TrustZone that will revolutionize and forever change the way that embedded software developers create microcontroller-based systems. Below are my top seven tips to help you get … Continue reading 7 Tips for Getting Started with TrustZone for MCU’s...


  • Embedded Basics

    Embedded Basics


    Embedded Basics – The Arm Security Manifesto
    Published. October 27, 2017

    Last week I attended Arm TechCon and a major theme through-out was embedded security. During the conference, Arm released their Security Manifesto which provides developers with Arm’s vision for how the IoT will be protected. Let’s briefly discuss a few highlights. First, I found the Arm Security Manifesto to be an interesting read. The document … Continue reading Embedded Basics – The Arm Security Manifesto...


  • Cloakable

    Cloakable


    Cybersecurity and Medical IoT Devices – Make it Trusted and SIEMple!
    Published. January 29, 2019

    Internet of Medical Things (IoMT) devices are already revolutionizing the healthcare business.  They are delivering on their promises of improved data access, convenience, operational efficiencies and automation for the Health Care Providers (HCP). Additional drivers […]...


  • Cyber Defense

    Cyber Defense


    "Writing Tips for IT Professionals"
    Published. January 25, 2019

        This cheat sheet offers guidelines for IT professionals seeking to improve technical writing skills.To print it, use the one-page PDF version; you can also customize the Word version of the document. Lenny Zeltser, the creatorof this cheat sheet,is the author of SEC402:The Secrets to Successful Cybersecurity Writing: Hack the Reader. Click the link … Continue reading Writing Tips for IT Professionals...


  • Taking Measure

    Taking Measure


    Identify, Protect, Detect, Respond and Recover: The NIST Cybersecurity Framework
    Published. October 23, 2018

    The NIST Cybersecurity Framework consists of standards, guidelines and best practices to manage cybersecurity-related risk. The Framework’s prioritized, flexible, and cost-effective approach helps to promote the protection and resilience of critical infrastructure and other sectors important to the economy and national security. We spoke with Amy Mahn, an international policy specialist in the NIST Applied Cybersecurity Division, about the Framework, who can use it and how it's evolving.   What...


  • Victor Chertakovsky

    Victor Chertakovsky


    How to Charge Lithium Iron Phosphate Rechargeable Batteries
    Published. September 2, 2018

    Lithium Iron Phosphate batteries are safer than Lithium-ion cells and are available in a range of huge cell sizes between 5 and 100 AH with much longer cycle life than conventional batteries...


  • Electronics Engineering Video Blog

    Electronics Engineering Video Blog


    EEVblog #1110 – Mailbag
    Published. August 9, 2018

    More than an hour of Mailbag! Forum HERE SPOILERS: Sony DVO-1000MD medical device video DVD recorder teardown 8:09 Security ISA card teardown from the 1980’s 18:39 Power Grid the board game! 25:02 USB soldering iron 27:21 TI-nSpire CAS+ calculator PROTOTYPE! 35:28 DIY JBC/Hakko soldering iron controller 41:49 UV LED lamp for PCB exposure 45:10 DIY ......


  • Stephane Boucher's DSP Blog

    Stephane Boucher's DSP Blog


    Elliptic Curve Cryptography
    Published. November 16, 2015

    Secure online communications require encryption.  One standard is AES (Advanced Encryption Standard) from NIST.  But for this to work, both sides need the same key for encryption and decryption.  This is called Private Key encryption.  Public Key encryption is used to create a private key between two sides that have not previously communicated.  Compared to the history......


  • Barr Code

    Barr Code


    C: The Immortal Programming Language
    Published. February 22, 2018

    Barr Group’s 2018 Embedded Systems Safety & Security Survey is now closed and I am in the midst of analyzing the data. This year a portion of my analysis is focused on multi-year trends. One trend that really stands out to me is that the C programming language refuses to give up the ghost. A […]...


  • Gabe On EDA

    Gabe On EDA


    ARM TechCon Report on IoT, Automotive, and Security
    Published. November 1, 2017

    ARM TechCon Report on IoT, Automotive, and Security Gabe Moretti Wed, 11/01/2017 - 07:58...


  • scalability.org

    scalability.org


    Disk, SSD, NVMe preparation tools cleaned up and on GitHub
    Published. September 14, 2017

    These are a collection of (MIT licensed) tools I’ve been working on for years to automate some of the major functionality one needs when setting up/using new machines with lots of disks/SSD/NVMe. The repo is here: https://github.com/joelandman/disk_test_setup . I will be adding some sas secure erase and formatting tools into this. These tools wrap other […]...


  • Functional Verification Blog

    Functional Verification Blog


    Sign Up For Free Verification Sessions -- Only A Few Days Left
    Published. July 19, 2010

    Mark your calendar and sign up for the two upcoming free verification sessions sponsored by Cadence. Space is limited. So, please sign up today! JULY 21 st All-Day, Hands-on technical workshop in Irvine, CA Topic: Advanced Verification Techniques using e /SV Workshop Learn how to architect an advanced testbench using OVM/UVM that contains generation, coverage and checking and much, much more..... This workshop will focus on introducing attendees to advanced verification techniques using the latest...


  • Electrical Engineers  Talk Tech

    Electrical Engineers Talk Tech


    Does Secure Erase Actually Work?
    Published. July 18, 2016

    Chris A. Ciufo, Editor, Embedded Systems Engineering In this Part 2 of 2, I examine the subject of using the flash manufacturer’s secure erase feature—since so many DoD documents recommend it. In Part 1 of this blog (“How Does One … Continue reading →...


  • Rands In Repose

    Rands In Repose


    Turn on 2FA before it’s too late
    Published. July 17, 2016

    Two-factor authentication (“2FA”) is intended as another layer of security to your online accounts, so if your password is hacked, your account can’t be accessed without a special code. While I clearly understand the value, I’ve been lazy about enabling on various services since… it’s a hassle. I’ve only enabled it when I’ve been required… More#...


  • Ed Burnette's Dev Connection

    Ed Burnette's Dev Connection


    More Android malware FUD is the only thing that is sprouting
    Published. August 8, 2012

    Yesterday, ZDNet's Rachel King picked up a malware story from security vendor Webroot. Now questions have arisen about the accuracy of the article, and the tactics and credibility of the vendor....


  • Laptops and Desktops Blog

    Laptops and Desktops Blog


    Fujitsu adds Intel Broadwell processors to new enterprise tablets, laptops
    Published. January 28, 2015

    The mobile devices include a pair of Ultrabooks and feature optional palm-based biometric security features....



Share and Enjoy:
  • Digg
  • Sphinn
  • del.icio.us
  • Facebook
  • Mixx
  • Google
Extension Media websites place cookies on your device to give you the best user experience. By using our websites, you agree to placement of these cookies and to our Privacy Policy. Please click here to accept.