Infineon OPTIGA™ Trust E – An IoT-Problem-Solver
After last years hype around IoT technology two things became clear: IoT is the defining trend of the next years and security is…
4 Concerning Questions Rising From The Jeep Hack & Chrysler’s Biggest Mistake
Got internet? Then you will probably have read about the Jeep Cherokee hack performed by Charlie Miller (Security Engineer, Twitter) and Chris Valasek (Director…
[Infographic] Security And The Internet Of Things
Here is what everyone tells you: Security in the Internet of Things (IoT) is vitally important. Wonder why exactly you should personally be…
Symmetric Authentication Explained At The Example Of The Atmel ATSHA204A
A crypto system should be secure even if everything about the system, except the key, is public knowledge – Kerckhoff’s law (from the…
6 Questions You Need To Answer To Protect Your System
Two weeks ago we defined several questions to find out if your application needs security. Now it’s time to think about what to…
9 Questions to Find Out if Your Application Needs Security!
The Internet of Things (IoT) was at the peak of Gartner’s Hype Cycle 2014 – just a couple months later it feels like it has…
“No iOS Zone” – Hack Makes iOS Devices Useless
Israel-based mobile security company Skycure discovered an iOS vulnerability which could enable hackers to crash nearby devices and to put them in an…
Opinion: The ConnectedDrive hack could have been prevented
Just a couple weeks ago BMW made headlines when a security research group of the German automobile club ADAC discovered a major security gap in…
Secure It Now!
By the end of last year complex spying malware arrived via an USB stick to the work computer of the unit head in…