You are currently viewing SemiWiki as a guest which gives you limited access to the site. To view blog comments and experience other SemiWiki features you must be a registered member. Registration is fast, simple, and absolutely free so please,
join our community today!
WP_Term Object
(
[term_id] => 97
[name] => Security
[slug] => security
[term_group] => 0
[term_taxonomy_id] => 97
[taxonomy] => category
[description] =>
[parent] => 0
[count] => 306
[filter] => raw
[cat_ID] => 97
[category_count] => 306
[category_description] =>
[cat_name] => Security
[category_nicename] => security
[category_parent] => 0
[is_post] =>
)
The case between Apple and the FBI may not be as limpid as it could be. If you ask me if Apple, or any US or Europe based supplier of high tech system should help the FBI (or any similar organization) and provide the technical support needed to extract information belonging to a terrorist, my answer would be definitely YES.
I don’t know… Read More
The article suggested by LinkedIn is titled “Should Apple fight a court order to unencrypt iPhones? #unlockiPhone”. However, my question is this, why didn’t the FBI just go to the NSA for what they needed? Why didn’t the FBI just hire the latest hacker who was able to hack the iphone and give him the same deal other hackers… Read More
This topic comes up periodically but for me had always been one of those things I’d get around to understanding better someday. A recent blog in SemiWiki got me looking a little harder and determined to write a blog to get this out of my system, if for no other reason than getting rid of excess tabs on my browser. So here’s my quick review.… Read More
From time to time when talking about security, it is useful to look at the big picture, but not to further lament the imminent collapse of the sky. We all know that the problem is big and we’re really not on top of it. A more productive discussion would be about what we can do to reduce the scope of the problem. And that has to start … Read More
For those among you who have read my previous SemiWiki articles, you will no doubt see a theme: the security of our connected world is badly broken, and for the bad guys, violating our online lives – both business and personal – is as easy as taking candy from the proverbial baby.… Read More
Why IoT Security is a Market for Lemonsby John Moor on 01-25-2016 at 4:00 pmCategories: IoT, Security
Concerns around the security of connected devices are continuing to rise. This is illustrated by July’s issue of The Economist where there are two articles on this theme outlining the perils of connected devices in the home, and more generally amongst the Internet of Things.
In “Home, Hacked Home: The perils of connected… Read More
The automotive cybersecurity forum put on by the National Highway Traffic Safety Administration (NHTSA) yesterday in Washington, DC, surfaced a wide range of issues and conflicts at the heart of the connected car industry. One clear takeaway from the event was that cars will never be secure.
… Read More
I am not sure about you but whenever I see those big market forecasts for IoT (and I’ve seen a lot)… my brain takes a short cut to “ok, I get it, it’s big”. And I believe it will be. But is “it’s big” that helpful? Or, to put it another way, does it hurt?
Robin Duke-Woolley of Beecham … Read More
The Internet of Things (IoT) as a concept is fascinating and exciting, but the key to gaining real business value from it, is effective communication between all elements of the architecture so you can deploy applications faster, process and analyze data at lightning speeds, and make decisions as soon as you can.
IoT architecture… Read More
Business history is littered with once-successful companies that couldn’t see the market tsunami that was coming their way until it was too late to do anything but stand up and be walloped by a wave of change that obliterated their businesses.
… Read More
Speculative Execution: Rethinking the Approach to CPU Scheduling