Global Sources
EE Times-Asia
Stay in touch with EE Times Asia
EE Times-Asia > Advanced Search > Stuxnet

Stuxnet Search results

?
?
total search12 articles
2015-01-27 Power grids offer path to effective malware detection
PFP Cybersecurity, a security startup, uses trends in power consumption activity, rather than standard malware detection, to spot cyber attacks against power and manufacturing plants.
2014-02-07 Wireless tech seen as threat to manufacturing security
The rising use of connected devices is exposing production sites to security breaches and cyber-attacks, compelling firms to seek ways to protect their networks, according to IHS.
2011-08-26 Wind River, McAfee strengthen security for embedded designs
The rise of Internet-enabled devices has given embedded system designers the challenge to incorporate security into their designs.
2012-02-16 Security issues in next-gen automotive electronics
With the remote connectivity now made possible by telematics, critical systems could be maliciously infiltrated by exploiting vulnerabilities in the car's embedded systems.
2010-07-22 New Windows OS malware found out
Microsoft Corp. has issued an advisory regarding attacks exploiting a vulnerability in Windows Shell, a component of Microsoft Windows.
2014-07-21 Interview: Infineon products take on counterfeiting
Infineon is bolstering its Optiga line to protect devices from malware and to control access mechanisms for secure software updates, adding flexibility for adapting to a variety of applications.
2015-07-31 Improving industrial cyber security one layer at a time
Although Industrial Internet of Things affords improvement in efficiencies and optimisation, there still remains cyber security issues that need to be addressed.
2015-04-24 Huawei, NXP get ready for Industry 4.0
The partnership will fully integrate Huawei's ICT infrastructure and connectivity solutions and NXP's secure connectivity solutions. Collaboration will focus on Industry 4.0 applications.
2015-01-29 How to secure the Internet of Things (Part 2)
In Part 2 of this series, we will focus on a secure boot, which is the root of trust and the cornerstone of an electronic device's trustworthiness.
2015-01-23 How to secure the Internet of Things (Part 1)
Find out how to how to identify and then assess the security risks for a connected electronic device, and how security is designed into electronic devices, with focus on public key-based algorithms.
2012-07-03 Enhancing embedded OS security
Here are some security best practices that embedded system developers need to consider in their designs.
2013-05-22 Enhance functional safety in embedded designs
Find out how to increase functional safety in networked embedded designs.
Bloggers Say

Bloggers Say

See what engineers like you are posting on our pages.

?
?
Back to Top