Security Blog Category

Mercedes-Benz E-Class, KEYLESS-GO Paket
Just a couple weeks ago we described how digital keys equipped with crypto hardware could be used to secure the communication between all kinds of locks and devices. However instead of adding safety modern car keys are often a security risk if the vehicles are equipped with technology for “keyless go”. This feature enables the owner to open a vehicle while leaving the key in the pocket and even start the car without getting it out. Now that’s comfy – for you and for thieves. The reason is the wayRead More
BMW i8 Key
With the connected car we not just open up new possibilities for the owners but also for hackers and thieves. Car hack’s like the one of a Jeep or BMW’s connected drive have proofed that modern vehicles often lag appropriate security technology. Among the main vulnerabilities are smartphones which are commonly used to access the car, start it remotely or locate it via apps. In order to add additional security and prevent hacker attacks the implementation of crypto hardware into the system would be an effective solution. The software developmentRead More
Windows Device Guard & TPM
Security hardware and software go hand in hand these days. Sure, for some less important things ensuring privacy by only using software will be sufficient but when it comes to enterprise level sensitive information you really need to throw some physical components in the mix to get a good result. One of the main challenges for IT-departments is to keep the devices and computers of employees and within the company safe and in order. To do so, control over which applications can run and which can’t is essential. With WindowsRead More
GCHQ Foyer ©GCHQ 2014
As we implement more and more IoT technology into different aspects of our lives we should be aware of sensitive data and ensure that we further equip applications with the right level of security precautions. Within fields like smart grid and smart metering manipulations can result in high economic losses or even shut down power supply for a whole region. Therefor security is of high priority within electronic metering and grid applications. If you google for scholar articles about security incidents and vulnerabilities within smart grid and smart metering applicationsRead More
embedded security
In one of our recent blog articles some weeks ago, we issued IT security for embedded systems. An issue that semiconductor manufacturers are targeting for years already. Security hardware components are deployed in personal computers for many year to secure sensitive data such as security keys, certificates and passwords. The latest press release from Infineon Technologies perfectly fits in this picture. The EBV partner announced that the world’s leading PC manufacturer Lenevo will count on Infineon’s embedded security solutions and will equip the new Lenovo ThinkPad® notebooks with the OPTIGA™Read More
Hacker IT Cyber Security
Whenever we talk about the IoT we also need to talk about cyber security. For developers and engineers it’s a challenge to protect services and products in two ways. Firstly, security technology is complex and needs to find a fine balance between protection and affordability. The second aspect is to make the security measures as easy to handle for customers as possible. The last one might be even more tricky than most of us have thought. Even setting a password to protect sensitive data is too much for many users.Read More
embedded security

Posted On March 15, 2016By Christian JakobIn Identification, Security Blog

IT Security for Embedded Systems

Various markets discovered the Internet of Things (IoT) for themselves and develop more and more products and devices. There are areas like Smart Grid, Connected Car, Smart Home & Building, personal health & fitness, or Smart Factory and Industry 4.0. Each of the subjects offer plenty to talk about in separate blog articles. But there is one thing that all of them have in common. And that is supposed to be the topic of this article: Security for the Internet of Things. Facing Increasing Security Needs So when we talkRead More
TLS & Induytry 4.0 / IoT
Secure communication is a prerequisites for Industry 4.0 applications. That bold statement becomes even clearer if we compare the impact of a hacker attack on personal, private IoT applications and industrial IoT (IIoT) applications. Malicious access to your personal email account is bad news for you and in case of your business mails for the department you are working for. A successful attack on a company however can cause big losses through espionage, cloning or slowed down production – which will eventually be bad news for a lot of peopleRead More
For the Identification Segment 2015 has been as exciting as it gets – we have seen some major highlights, security flaws, hacker attacks and remarkable new semiconductor solutions. The IoT is still the defining market trend but there have been several other happenings under the huge roof of the interconnectivity of everything which are well worth taking a look back on.  This year’s huge demand from diverse customers for IoT solutions accelerated the number of new industrial microcontrollers with integrated security features on board. In addition, we have seen theRead More
After last years hype around IoT technology two things became clear: IoT is the defining trend of the next years and security is a major challenge within it. While security software might be sufficient in some cases there is usually no way around implementing security hardware in applications in order to add the necessary protection to a device.   Having said that, there is the next issue: Affordability of security hardware. Security chips will only be implemented into products if the required expenses and efforts are reasonable. Solutions which create aRead More