I remember when I was a kid and my dad would perform magic tricks. His magic was so bad but at the time I thought it really worked and was real. You know the trick – get a coin, put it in your hand, wave your other hand over the coin, say ‘abra kadabra’ and then put the coin into the other hand when the person isn’t … Read More
Quantum Code-Cracking Takes Another Hit: Lattice-based Cryptography
Public-key crypto-systems rely these days on approaches founded in mathematical methods which are provably hard to crack. The easiest to understand requires factorization of a key based on the product of two large prime numbers. Much has been made recently of the ability of quantum computers to crack this style of encryption.… Read More
10 Predictions for the Future of IoT
A Google search for “Internet of Things” term reveals over 280,000,000 results, thanks to the media making the connection between the smart home, wearable devices, and the connected automobile, IoT has begun to become part of the popular parlance. But that’s not the complete picture, according to Gartner’s… Read More
IOT Security Trends – Is the online world more dangerous??
Security threats are the biggest concern among the main concerns on the Internet of Things. Due to its very nature, it is a target of interest for those who want to commit either industrial or national espionage. By hacking into these systems and putting them under a denial of service, or other attacks, an entire network of systems… Read More
Singularity, Semiconductors and Software
One of my all-time favorite movies is 2001 A Space Odyssey where one of the leading roles is an AI-based system aboard a spacecraft named Hal that is designed to be a perfect machine yet makes a mistake and then cascades into assaulting and eliminating the human crew members. The future time when semiconductors and software combine… Read More
A CIA Perspective on Privacy and Security
It may seem odd to look to the CIA for viewpoints in this area but in in many ways they are just as concerned as we are. After all, in aggregate, widespread identity theft and hacking both internally and by foreign nationals, theft, electronic ransom and other illicit acts are as much a threat to the security of the country as they are … Read More
Multiple Facets of Cyber Security Workshop!
Security is one of the new categories we track and it is keeping SemiWiki very busy. Security in itself, as a result of the FBI vs Apple comedy routine, but also security across the EDA, IP, ARM, Mobile, IoT, and Automotive categories. … Read More
Guard Vehicles from Cyber Attacks!
Law enforcement officers, emergency responders and commercial fleet operators cannot afford to operate vehicles without the assurance of security. A police officer, emergency medical technician or truck driver cannot live with any uncertainty regarding the integrity of their vehicle’s safety systems and powertrain.
That… Read More
Growing Security Concerns Due To Internet of Things (IoT)
It is believed that by 2020, there will be about 50 billion connected devices across the world, more than 7 times the present human population. The growth of digital devices is increasing exponentially because both users and technology are getting smarter every next day and the compatibility between the two is improving phenomenally… Read More
What the FBI is Saying about Connected Cars
The U.S. Federal Bureau of Investigation (FBI), in cooperation with the U.S. Department of Transportation, put out a written public service announcement (PSA) last week detailing the agency’s concerns regarding automotive cybersecurity and its recommendations for the driving and vehicle owning public. The PSA followed… Read More
TSMC N3 Process Technology Wiki