Security Hardware Tag

maxim embedded security
Guest blog by Christine Young From Yahoo to LinkedIn, smart speakers to security cameras, DVRs, and even baby monitors—all of these things have been hacked at some point (or points, in some incidents). As smart, connected products become more pervasive in our everyday lives, they also provide more avenues for cybercriminals. In some cases, it’s a matter of end users needing to be more diligent about, say, changing default logins and passwords. In other cases, the device itself simply wasn’t designed with very strong security. The first case is aRead More
IoT Security Coverimage
Developing IoT devices without security is like cooking fish&chips without a fryer – the result is hardly going to be perfect. With millions of connections and objects that speak to each other you really want to make sure that your products are immune to hacking, cloning and counterfeiting. Achieving this needs clever strategies that enable you to clearly identify electronic objects. In order to enable companies to gain easy access to personalized security hardware, EBV has joined forces with Infineon and Data I/O to create a new supply chain serviceRead More
If you’re an electronics developer designing IoT or other connected applications you will know two things: Firstly, fast-time-to-market is a key to success. Secondly, security is a complex feature to implement, however it’s of great importance. Another truth you probably are aware of is that a vast amount of devices currently on the market compromise security for more competitive retail price and quicker release. With the rising number of cyber-attacks system designers will need to rethink their security structures and implement advanced security features while meeting strict development deadlines. InRead More
Android Smartphone
Business emails, private photos and important documents – users tend to store sensitive data on their smartphones creating the need for privacy and security solutions on the devices. Therefore Apple and Google protect your data with full disk encryption (FDE) on iOS and Android products. This protection of all data stored on our phones is usually achieved by using a passcode which you need to enter to unlock the device. To the user the solutions of Apple and Google appear very similar. On both systems it is possible to setRead More