Antenna Design Services From EBV Elektronik: NFC Antenna Design Made Easy!
With its ability to enable secure data exchange between two devices with a simple touch gesture, NFC has become a very popular technology…
EBV Is Now Listed As Preferred Security Partner by Infineon
Here at EBV, we are constantly preaching that security needs to be an essential part of every connected application and device. Headlines and…
Boost Your IoT Security With Personalized Hardware
Developing IoT devices without security is like cooking fish&chips without a fryer – the result is hardly going to be perfect. With millions…
Prepare To Fight The Army Of IoT Devices
Wow, that headline sounds dramatic. Will we really need to battle our own connected kitchen appliances, smartwatches and printers at some point? To…
STSAFE-A Is The Secure Element You’ve Been Waiting For
Yes, the IoT will spark billions of new connections. Yes, there will be tons of unattended and autonomous devices connected to the internet…
TLS & Industry 4.0 – A Perfect Fit?
Secure communication is a prerequisites for Industry 4.0 applications. That bold statement becomes even clearer if we compare the impact of a hacker…
A Lot To Do For The Identification Segment 2015 – Everything You Need To Know
For the Identification Segment 2015 has been as exciting as it gets – we have seen some major highlights, security flaws, hacker attacks…
Infineon OPTIGA™ Trust E – An IoT-Problem-Solver
After last years hype around IoT technology two things became clear: IoT is the defining trend of the next years and security is…
4 Concerning Questions Rising From The Jeep Hack & Chrysler’s Biggest Mistake
Got internet? Then you will probably have read about the Jeep Cherokee hack performed by Charlie Miller (Security Engineer, Twitter) and Chris Valasek (Director…
Symmetric Authentication Explained At The Example Of The Atmel ATSHA204A
A crypto system should be secure even if everything about the system, except the key, is public knowledge – Kerckhoff’s law (from the…