Infineon OPTIGA™ Trust E – An IoT-Problem-Solver
After last years hype around IoT technology two things became clear: IoT is the defining trend of the next years and security is…
Symmetric Authentication Explained At The Example Of The Atmel ATSHA204A
A crypto system should be secure even if everything about the system, except the key, is public knowledge – Kerckhoff’s law (from the…
6 Questions You Need To Answer To Protect Your System
Two weeks ago we defined several questions to find out if your application needs security. Now it’s time to think about what to…
9 Questions to Find Out if Your Application Needs Security!
The Internet of Things (IoT) was at the peak of Gartner’s Hype Cycle 2014 – just a couple months later it feels like it has…
Opinion: The ConnectedDrive hack could have been prevented
Just a couple weeks ago BMW made headlines when a security research group of the German automobile club ADAC discovered a major security gap in…
Secure It Now!
By the end of last year complex spying malware arrived via an USB stick to the work computer of the unit head in…
CES 2015 – Danalock makes security smart
We found another little jewel at the huge CES 2015! The “danalock” which is designed by Poly-Control looks gorgeous and comes with great…
NFC Sensor Transponder for uncountable new Possibilities
Near Field Communication (NFC) enables devices such as smartphones to communicate with each other by touching them. The technology is hot these days…