- Article
(12) -
Forum
(0) -
Blog
(0)
total search12 articles
2015-01-27 | Power grids offer path to effective malware detection PFP Cybersecurity, a security startup, uses trends in power consumption activity, rather than standard malware detection, to spot cyber attacks against power and manufacturing plants. |
2014-02-07 | Wireless tech seen as threat to manufacturing security The rising use of connected devices is exposing production sites to security breaches and cyber-attacks, compelling firms to seek ways to protect their networks, according to IHS. |
2011-08-26 | Wind River, McAfee strengthen security for embedded designs The rise of Internet-enabled devices has given embedded system designers the challenge to incorporate security into their designs. |
2012-02-16 | Security issues in next-gen automotive electronics With the remote connectivity now made possible by telematics, critical systems could be maliciously infiltrated by exploiting vulnerabilities in the car's embedded systems. |
2010-07-22 | New Windows OS malware found out Microsoft Corp. has issued an advisory regarding attacks exploiting a vulnerability in Windows Shell, a component of Microsoft Windows. |
2014-07-21 | Interview: Infineon products take on counterfeiting Infineon is bolstering its Optiga line to protect devices from malware and to control access mechanisms for secure software updates, adding flexibility for adapting to a variety of applications. |
2015-07-31 | Improving industrial cyber security one layer at a time Although Industrial Internet of Things affords improvement in efficiencies and optimisation, there still remains cyber security issues that need to be addressed. |
2015-04-24 | Huawei, NXP get ready for Industry 4.0 The partnership will fully integrate Huawei's ICT infrastructure and connectivity solutions and NXP's secure connectivity solutions. Collaboration will focus on Industry 4.0 applications. |
2015-01-29 | How to secure the Internet of Things (Part 2) In Part 2 of this series, we will focus on a secure boot, which is the root of trust and the cornerstone of an electronic device's trustworthiness. |
2015-01-23 | How to secure the Internet of Things (Part 1) Find out how to how to identify and then assess the security risks for a connected electronic device, and how security is designed into electronic devices, with focus on public key-based algorithms. |
2012-07-03 | Enhancing embedded OS security Here are some security best practices that embedded system developers need to consider in their designs. |
2013-05-22 | Enhance functional safety in embedded designs Find out how to increase functional safety in networked embedded designs. |
--- total search 12 articles, total 1 pages, The 1 Page ---
1Bloggers Say
See what engineers like you are posting on our pages.