IoT Robot Human
IoT and security should go hand in hand. Unfortunately they don’t as proven by tons of hacks of cars, smartphones, clouds and more. This is a major upset as security is the prerequisite for a successful future of IoT. If we can’t fix issues in this area now and develop strategies to integrate security solutions in all future aspects and areas of our connected world we will fail or at least slow down the adoption and introduction of the IoT. Basically every technologist should be aware and well informed aboutRead More
Guest blog from Jim Wallace Simply put, security for Embedded IoT devices is about protecting assets from malicious attack. Typically this protection is thought about in terms of keeping some assets, such as crypto keys, secret and controlling how software and data is modified. In order for the Internet of Things (IoT) to be successful it is important that devices and services are appropriately protected. As IoT products become successful they will become increasingly attractive for attackers and so appropriate security must be baked into every system and at everyRead More
Mercedes-Benz E-Class, KEYLESS-GO Paket
Just a couple weeks ago we described how digital keys equipped with crypto hardware could be used to secure the communication between all kinds of locks and devices. However instead of adding safety modern car keys are often a security risk if the vehicles are equipped with technology for “keyless go”. This feature enables the owner to open a vehicle while leaving the key in the pocket and even start the car without getting it out. Now that’s comfy – for you and for thieves. The reason is the wayRead More
BMW i8 Key
With the connected car we not just open up new possibilities for the owners but also for hackers and thieves. Car hack’s like the one of a Jeep or BMW’s connected drive have proofed that modern vehicles often lag appropriate security technology. Among the main vulnerabilities are smartphones which are commonly used to access the car, start it remotely or locate it via apps. In order to add additional security and prevent hacker attacks the implementation of crypto hardware into the system would be an effective solution. The software developmentRead More
Windows Device Guard & TPM
Security hardware and software go hand in hand these days. Sure, for some less important things ensuring privacy by only using software will be sufficient but when it comes to enterprise level sensitive information you really need to throw some physical components in the mix to get a good result. One of the main challenges for IT-departments is to keep the devices and computers of employees and within the company safe and in order. To do so, control over which applications can run and which can’t is essential. With WindowsRead More
GCHQ Foyer ©GCHQ 2014
As we implement more and more IoT technology into different aspects of our lives we should be aware of sensitive data and ensure that we further equip applications with the right level of security precautions. Within fields like smart grid and smart metering manipulations can result in high economic losses or even shut down power supply for a whole region. Therefor security is of high priority within electronic metering and grid applications. If you google for scholar articles about security incidents and vulnerabilities within smart grid and smart metering applicationsRead More
embedded security
In one of our recent blog articles some weeks ago, we issued IT security for embedded systems. An issue that semiconductor manufacturers are targeting for years already. Security hardware components are deployed in personal computers for many year to secure sensitive data such as security keys, certificates and passwords. The latest press release from Infineon Technologies perfectly fits in this picture. The EBV partner announced that the world’s leading PC manufacturer Lenevo will count on Infineon’s embedded security solutions and will equip the new Lenovo ThinkPad® notebooks with the OPTIGA™Read More
Hacker IT Cyber Security
Whenever we talk about the IoT we also need to talk about cyber security. For developers and engineers it’s a challenge to protect services and products in two ways. Firstly, security technology is complex and needs to find a fine balance between protection and affordability. The second aspect is to make the security measures as easy to handle for customers as possible. The last one might be even more tricky than most of us have thought. Even setting a password to protect sensitive data is too much for many users.Read More