IC Mask SemiWiki Webinar Banner
WP_Term Object
(
    [term_id] => 97
    [name] => Security
    [slug] => security
    [term_group] => 0
    [term_taxonomy_id] => 97
    [taxonomy] => category
    [description] => 
    [parent] => 0
    [count] => 298
    [filter] => raw
    [cat_ID] => 97
    [category_count] => 298
    [category_description] => 
    [cat_name] => Security
    [category_nicename] => security
    [category_parent] => 0
    [is_post] => 
)

A Little More Quantum Computing

A Little More Quantum Computing
by Bernard Murphy on 02-25-2016 at 7:00 am

There’s another domain in Quantum Computing (QC) which periodically attracts headlines – Quantum Key Distribution (QKD). I thought this worth covering because it does not depend on the ability to do parallel computation on superposition states, so may not be as much at the mercy of limited coherence times. And ultimately… Read More


Apple Google FaceBook and Person of Interest!

Apple Google FaceBook and Person of Interest!
by Daniel Nenni on 02-24-2016 at 12:00 pm

Apple, Google, and FaceBook are making significant investments in artificial intelligence (deep learning) and other advertising (snooping) enabling technology to better serve (exploit) their customers (us) and make trillions of dollars for their offshore accounts. This reminds me (in a very creepy way) of the TV series “Person… Read More


Should terrorists prefer iPhone (thanks to privacy)?

Should terrorists prefer iPhone (thanks to privacy)?
by Eric Esteve on 02-23-2016 at 10:00 am

The case between Apple and the FBI may not be as limpid as it could be. If you ask me if Apple, or any US or Europe based supplier of high tech system should help the FBI (or any similar organization) and provide the technical support needed to extract information belonging to a terrorist, my answer would be definitely YES.

I don’t know… Read More


Why Apple’s Fight is Fruitless!

Why Apple’s Fight is Fruitless!
by Maria Miccoli on 02-19-2016 at 7:00 am

The article suggested by LinkedIn is titled “Should Apple fight a court order to unencrypt iPhones? #unlockiPhone”. However, my question is this, why didn’t the FBI just go to the NSA for what they needed? Why didn’t the FBI just hire the latest hacker who was able to hack the iphone and give him the same deal other hackers… Read More


Quantum Computing – A Quick Review

Quantum Computing – A Quick Review
by Bernard Murphy on 02-09-2016 at 4:00 pm

This topic comes up periodically but for me had always been one of those things I’d get around to understanding better someday. A recent blog in SemiWiki got me looking a little harder and determined to write a blog to get this out of my system, if for no other reason than getting rid of excess tabs on my browser. So here’s my quick review.… Read More


Complexity And Security

Complexity And Security
by Bernard Murphy on 02-08-2016 at 7:00 am

From time to time when talking about security, it is useful to look at the big picture, but not to further lament the imminent collapse of the sky. We all know that the problem is big and we’re really not on top of it. A more productive discussion would be about what we can do to reduce the scope of the problem. And that has to start … Read More


Crypto Key Exchange …like taking candy from a digital baby

Crypto Key Exchange …like taking candy from a digital baby
by Bill Montgomery on 01-31-2016 at 4:00 pm

For those among you who have read my previous SemiWiki articles, you will no doubt see a theme: the security of our connected world is badly broken, and for the bad guys, violating our online lives – both business and personal – is as easy as taking candy from the proverbial baby.… Read More


Why IoT Security is a Market for Lemons

Why IoT Security is a Market for Lemons
by John Moor on 01-25-2016 at 4:00 pm

Concerns around the security of connected devices are continuing to rise. This is illustrated by July’s issue of The Economist where there are two articles on this theme outlining the perils of connected devices in the home, and more generally amongst the Internet of Things.

In “Home, Hacked Home: The perils of connected… Read More


Your Car Will Never be Secure

Your Car Will Never be Secure
by Roger C. Lanctot on 01-24-2016 at 4:00 pm

The automotive cybersecurity forum put on by the National Highway Traffic Safety Administration (NHTSA) yesterday in Washington, DC, surfaced a wide range of issues and conflicts at the heart of the connected car industry. One clear takeaway from the event was that cars will never be secure.
Read More


IoT Markets: let’s get real about the numbers

IoT Markets: let’s get real about the numbers
by John Moor on 01-20-2016 at 4:00 pm

I am not sure about you but whenever I see those big market forecasts for IoT (and I’ve seen a lot)… my brain takes a short cut to “ok, I get it, it’s big”. And I believe it will be. But is “it’s big” that helpful? Or, to put it another way, does it hurt?

Robin Duke-Woolley of Beecham
Read More