Cyber Security Tag

maxim embedded security
Guest blog by Christine Young From Yahoo to LinkedIn, smart speakers to security cameras, DVRs, and even baby monitors—all of these things have been hacked at some point (or points, in some incidents). As smart, connected products become more pervasive in our everyday lives, they also provide more avenues for cybercriminals. In some cases, it’s a matter of end users needing to be more diligent about, say, changing default logins and passwords. In other cases, the device itself simply wasn’t designed with very strong security. The first case is aRead More
IoT Security Coverimage
Developing IoT devices without security is like cooking fish&chips without a fryer – the result is hardly going to be perfect. With millions of connections and objects that speak to each other you really want to make sure that your products are immune to hacking, cloning and counterfeiting. Achieving this needs clever strategies that enable you to clearly identify electronic objects. In order to enable companies to gain easy access to personalized security hardware, EBV has joined forces with Infineon and Data I/O to create a new supply chain serviceRead More
Security is essential for the growing Internet of Things. As you probably know, more and more devices are connecting to the Internet every day. It has even been predicted that by 2021 over 28 billion devices will be connected, with 16  billion of them being directly related to the IoT. The infographic below highlights the growing IoT and why security is so important for the billions of new devices. EBV Elektronik is offering support when it comes to security strategies and efficient implementation of safety features into your designs. Please don’t hesitate to getRead More
Wow, that headline sounds dramatic. Will we really need to battle our own connected kitchen appliances, smartwatches and printers at some point? To answer this questions let’s assess some recent events. Taking Out Some Of The Most Frequently Visited Internet Services With One Attack Just a few weeks back a Distributed Denial of Service (DDoS) attack on Domain Name System (DNS) service provider DynDNS caused a major outage of a number of well-known internet pages and brands (e.g. Amazon, PayPal, Spotify, Soundcloud, Twitter). For those not familiar with the termRead More
Android Smartphone
Business emails, private photos and important documents – users tend to store sensitive data on their smartphones creating the need for privacy and security solutions on the devices. Therefore Apple and Google protect your data with full disk encryption (FDE) on iOS and Android products. This protection of all data stored on our phones is usually achieved by using a passcode which you need to enter to unlock the device. To the user the solutions of Apple and Google appear very similar. On both systems it is possible to setRead More
IoT Robot Human
IoT and security should go hand in hand. Unfortunately they don’t as proven by tons of hacks of cars, smartphones, clouds and more. This is a major upset as security is the prerequisite for a successful future of IoT. If we can’t fix issues in this area now and develop strategies to integrate security solutions in all future aspects and areas of our connected world we will fail or at least slow down the adoption and introduction of the IoT. Basically every technologist should be aware and well informed aboutRead More
Guest blog from Jim Wallace Simply put, security for Embedded IoT devices is about protecting assets from malicious attack. Typically this protection is thought about in terms of keeping some assets, such as crypto keys, secret and controlling how software and data is modified. In order for the Internet of Things (IoT) to be successful it is important that devices and services are appropriately protected. As IoT products become successful they will become increasingly attractive for attackers and so appropriate security must be baked into every system and at everyRead More
Mercedes-Benz E-Class, KEYLESS-GO Paket
Just a couple weeks ago we described how digital keys equipped with crypto hardware could be used to secure the communication between all kinds of locks and devices. However instead of adding safety modern car keys are often a security risk if the vehicles are equipped with technology for “keyless go”. This feature enables the owner to open a vehicle while leaving the key in the pocket and even start the car without getting it out. Now that’s comfy – for you and for thieves. The reason is the wayRead More
Smart Home Controller
Guest blog from Ralph Goodman. In a world where all of your devices communicate and can be controlled from one central location, there is a growing concern about security. Interconnectedness can be a great thing. It allows users greater levels of convenience and control over their devices, which is unparalleled to anything we have seen before. There are many benefits, but there is still this one looming threat. The Concerns There is an old clique in the security world that pervades the minds of all skeptics. “A chain is onlyRead More
BMW i8 Key
With the connected car we not just open up new possibilities for the owners but also for hackers and thieves. Car hack’s like the one of a Jeep or BMW’s connected drive have proofed that modern vehicles often lag appropriate security technology. Among the main vulnerabilities are smartphones which are commonly used to access the car, start it remotely or locate it via apps. In order to add additional security and prevent hacker attacks the implementation of crypto hardware into the system would be an effective solution. The software developmentRead More