800x100 static WP 3
WP_Term Object
(
    [term_id] => 97
    [name] => Security
    [slug] => security
    [term_group] => 0
    [term_taxonomy_id] => 97
    [taxonomy] => category
    [description] => 
    [parent] => 0
    [count] => 284
    [filter] => raw
    [cat_ID] => 97
    [category_count] => 284
    [category_description] => 
    [cat_name] => Security
    [category_nicename] => security
    [category_parent] => 0
    [is_post] => 
)

Cybercriminals Next Targets: Short Term Dangers (part 1 of 2)

Cybercriminals Next Targets: Short Term Dangers (part 1 of 2)
by Matthew Rosenquist on 12-14-2016 at 12:00 pm

AAEAAQAAAAAAAAiAAAAAJDkzODVhYTI0LWMwNjctNGVhNC1iYzg5LWNlN2QyNTc2ZTRiNg

Knowing what cybercriminals are targeting today is easy. Their attacks are loud, impactful, and have the elegance of a herd of bulls crashing through a glassware shop. The tougher challenge is figuring out where they will take aim tomorrow. Knowing where cyber threats will attack in the future, gives the necessary insights to … Read More


3 Reasons Why is Cybersecurity Losing

3 Reasons Why is Cybersecurity Losing
by Matthew Rosenquist on 12-11-2016 at 12:00 pm

AAEAAQAAAAAAAAiRAAAAJDAxZTg4NTZjLWIxYmItNGI1Zi04NWZmLWQ5ZTI4NjFhMzgxZQ

Cyber threats are currently outpacing the defenders but it does not need to be the case. Attacks are increasing in number and type, with the overall impacts are becoming greater. Cybersecurity is struggling to keep our digital lives and assets protected from the onslaught of attacks but facing great challenges. By understanding… Read More


Hack This? Making Software a Moving Target

Hack This? Making Software a Moving Target
by Bernard Murphy on 12-06-2016 at 4:00 pm

It sometimes seems that the black hats are always one step ahead of the white hats in the never-ending security game. One of the especially invidious ways hackers have found to evade detection is through mutation – changing the code in a virus on each copy, defeating classical signature detection methods and potentially requiring… Read More


How to Secure a SoC while Keeping Area and Power Competitive?

How to Secure a SoC while Keeping Area and Power Competitive?
by Eric Esteve on 11-29-2016 at 7:00 am

I have attended LETI conference last June and remember the paper presented by Alain Merle, their security guru. Alain said that smart cards are secured because up to 50% of the Silicon area is dedicated to security. When you design a SoC to address applications like smart metering, NFC payment or embedded SIM, you know in advance … Read More


The New Reality for IoT Security

The New Reality for IoT Security
by Matthew Rosenquist on 11-28-2016 at 4:00 pm

Recent Distributed Denial of Service (DDoS) attacks are forcing a shift in Internet-of-Things (IoT) security thinking. The dangers are expanding as attackers are taking advantage of billions of IoT devices, conscripting them into their botnet armies for massive DDoS attacks.… Read More


IoT Tech from Iowa

IoT Tech from Iowa
by Bernard Murphy on 11-22-2016 at 7:00 am

When you see Iowa and IoT in a title, you probably think of agricultural applications and Iowa as a consumer. In fact, they have their own pretty active tech development culture especially around Des Moines. Certainly some of this is focused on agtech, but there are also players in fintech, payment tech, health-tech, business automation,… Read More


Where hackers take their money – Casinos, Cryptocurrency, and Virtual Worlds

Where hackers take their money – Casinos, Cryptocurrency, and Virtual Worlds
by Matthew Rosenquist on 11-20-2016 at 7:00 am

AAEAAQAAAAAAAAgsAAAAJDUxODdlYTRlLTViMDUtNGY0OC05NDY0LTgxNWQ2ZThmMDlmMw

Cybercrime is reaching epidemic levels. Some estimates predict global annual cybercrime costs will reach $6 trillion by 2021. This includes the costs of security as well as the losses from thefts and fraud from successful attacks. Criminals are finding themselves in a position of having gained electronic assets but need to transform… Read More


Webinar: Improve Security For IoT Edge Devices With Custom SoCs

Webinar: Improve Security For IoT Edge Devices With Custom SoCs
by Daniel Nenni on 11-19-2016 at 7:00 am

The only thing hotter than IoT on SemiWiki.com right now is IoT Security. In 2016 we saw a record amount of reported cyber security breaches with compelling consequences (US Presidential Election) and that trend will continue. The most recent DDoS (distributed denial of service) attacks using botnets on insecure IoT devices … Read More


IoT Worms Could Spread Like Zombies

IoT Worms Could Spread Like Zombies
by Matthew Rosenquist on 11-18-2016 at 12:00 pm

AAEAAQAAAAAAAAlfAAAAJGJjZjlmZGUxLWJlZmYtNDY3ZS04MWRhLTA4YWVmYTg1OTJiNA

Security researchers recently created a proof-of-concept attack against Internet connected lightbulbs, causing breached devices to reach out and infect their neighbors. Propagation continues and spreads itself across the community. This hack highlights the insecurity in one of many IoT network protocols.

Researchers… Read More


DDoS Attack: A Wake-Up Call for IoT

DDoS Attack: A Wake-Up Call for IoT
by Ahmed Banafa on 11-13-2016 at 12:00 pm

AAEAAQAAAAAAAAdvAAAAJGY1OGVmZTA1LTQyYTYtNDFiYi04MDhiLTg3YjI2Mzc3MGNhNg

Welcome to the world of Internet of Things wherein a glut of devices are connected to the internet which emanates massive amounts of data. Analysis and use of this data will have real positive impact on our lives. But we have many hoops to jump before we can claim that crown starting with a huge number of devices lacking unified platform… Read More