800x100 Webinar (1)
WP_Term Object
(
    [term_id] => 97
    [name] => Security
    [slug] => security
    [term_group] => 0
    [term_taxonomy_id] => 97
    [taxonomy] => category
    [description] => 
    [parent] => 0
    [count] => 300
    [filter] => raw
    [cat_ID] => 97
    [category_count] => 300
    [category_description] => 
    [cat_name] => Security
    [category_nicename] => security
    [category_parent] => 0
    [is_post] => 
)

Floki Bot is Becoming an International Sensation with Cybercriminals

Floki Bot is Becoming an International Sensation with Cybercriminals
by Matthew Rosenquist on 12-22-2016 at 7:00 am

Floki Bot, a new financial oriented malware, is popular with English, Portuguese, and Russian speaking underground criminal markets, winning over cybercriminals with new features and functionality. It is currently being used by a number of different cybercrime groups around the world and is being sold on the dark market for… Read More


Predictions for the IOT in 2017

Predictions for the IOT in 2017
by Bill McCabe on 12-21-2016 at 2:00 pm

Although we are a far cry from Nostradamus, there are some fairly reliable predictions that can be made about 2017 and beyond.

The first bold prediction is that 2017 will see a bump in security, and a demand for skilled workers. Since there will be a growing demand for AI and the containers that are utilized to transmit information,… Read More


ARM and Open Silicon Join Forces to Fight the IoT Edge Wars!

ARM and Open Silicon Join Forces to Fight the IoT Edge Wars!
by Mitch Heins on 12-19-2016 at 4:00 pm


I spent the last several days doing a deep dive into the world of IoT security and what I’ve learned has scared the pants off me. Various analysts predict that there will be over 30 billion connected IoT devices by the year 2020 growing from 9.9 million in 2013. A quick audit of my home identified over 40 connected devices including everything… Read More


Top IOT News for 2016

Top IOT News for 2016
by Bill McCabe on 12-18-2016 at 12:00 pm

2016 will go down as being part of the golden era for the Internet of things. This last year has experienced incredible advancements like cars that drive themselves, and cities that actually smarter. It has also been a learning experience where major security breaches threatened us, but we worked past them, and ultimately built… Read More


What Stephen Hawking gets right and wrong about the most dangerous time for our planet

What Stephen Hawking gets right and wrong about the most dangerous time for our planet
by Vivek Wadhwa on 12-15-2016 at 4:00 pm

Stephen Hawking made a bold headline last week: “This is the most dangerous time for our planet.”

In an essay in the Guardian, the renowned theoretical physicist wrote: “Whatever we might think about the decision by the British electorate to reject membership of the European Union and by the American public to embrace Donald Trump… Read More


Cybercriminals Next Targets: Long Term Prizes (part 2 of 2)

Cybercriminals Next Targets: Long Term Prizes (part 2 of 2)
by Matthew Rosenquist on 12-15-2016 at 12:00 pm

AAEAAQAAAAAAAAhUAAAAJGVmZTI3MmI1LTNmMWEtNGFlMi05M2YxLTQ2MzdiMWU0NTE1NQ

In the previous blog, Cybercriminals Next Targets: Short Term Dangers (part 1 of 2), I outlined how cybercriminals will use the holiday season to victimize unwary consumers and target businesses. They will also dive deeper into leveraging Internet-of-Things (IoT) devices. The longer-term outlook expands their reach to more… Read More


Cybercriminals Next Targets: Short Term Dangers (part 1 of 2)

Cybercriminals Next Targets: Short Term Dangers (part 1 of 2)
by Matthew Rosenquist on 12-14-2016 at 12:00 pm

AAEAAQAAAAAAAAiAAAAAJDkzODVhYTI0LWMwNjctNGVhNC1iYzg5LWNlN2QyNTc2ZTRiNg

Knowing what cybercriminals are targeting today is easy. Their attacks are loud, impactful, and have the elegance of a herd of bulls crashing through a glassware shop. The tougher challenge is figuring out where they will take aim tomorrow. Knowing where cyber threats will attack in the future, gives the necessary insights to … Read More


3 Reasons Why is Cybersecurity Losing

3 Reasons Why is Cybersecurity Losing
by Matthew Rosenquist on 12-11-2016 at 12:00 pm

AAEAAQAAAAAAAAiRAAAAJDAxZTg4NTZjLWIxYmItNGI1Zi04NWZmLWQ5ZTI4NjFhMzgxZQ

Cyber threats are currently outpacing the defenders but it does not need to be the case. Attacks are increasing in number and type, with the overall impacts are becoming greater. Cybersecurity is struggling to keep our digital lives and assets protected from the onslaught of attacks but facing great challenges. By understanding… Read More


Hack This? Making Software a Moving Target

Hack This? Making Software a Moving Target
by Bernard Murphy on 12-06-2016 at 4:00 pm

It sometimes seems that the black hats are always one step ahead of the white hats in the never-ending security game. One of the especially invidious ways hackers have found to evade detection is through mutation – changing the code in a virus on each copy, defeating classical signature detection methods and potentially requiring… Read More


How to Secure a SoC while Keeping Area and Power Competitive?

How to Secure a SoC while Keeping Area and Power Competitive?
by Eric Esteve on 11-29-2016 at 7:00 am

I have attended LETI conference last June and remember the paper presented by Alain Merle, their security guru. Alain said that smart cards are secured because up to 50% of the Silicon area is dedicated to security. When you design a SoC to address applications like smart metering, NFC payment or embedded SIM, you know in advance … Read More