Global Sources
EE Times-Asia
Stay in touch with EE Times Asia
EE Times-Asia > Advanced Search > hacker

hacker Search results

?
?
total search50 articles
2014-12-08 Hacker attack on Sony sheds light on total system invasion
The company is still reeling from a data breach and a wiper attack since they began Nov. 24, exposing sensitive and confidential data and intellectual property, as well as client information.
2015-02-16 Why is Android an easy target for malware infections?
Android phones and tablets are responsible for about 50 per cent of the malware infections observed. Android offers the easiest target for this because of its open app environment.
2003-07-01 Securing connected devices from Internet outlaws
The connected so many envision won't happen without the secure transfer of information over networks. Here is a breakdown of the existing techniques for making sure our connected devices are safe from Internet outlaws.
2007-03-16 Secure portable CEs with OTP memory
Content protection and post-process analog cost cutting are increasingly important in CE devices. Chip developers who want to handle these requirements cost-effectively must rethink the types of memory IP they use and consider using OTP memory.
2004-12-01 Scan design called portal for hackers
Any chip that uses scan designand any system built around it--may be vulnerable to hackers.
2003-11-03 Protocol stacks are Achilles' heel of net security
The key to preventing network attacks is to understand and capitalize on the weak points of the protocols that power them.
2014-10-22 Is China trying to phish iCloud users' passwords?
The great firewall of China is preventing users from connecting to iCloud services, fuelling suspicions that the government is stealing user credentials and other personal information.
2008-07-22 Court favors release of Mifare security report
A court in Arnhem, the Netherlands, has turned down NXP Semiconductors' request to stop the publication of a scientific study into the security of its Mifare Classic contactless smart card chip technology.
2013-06-25 Utilising non-volatile memory IP in SoC designs
Integrating anti-fuse NVM on chip for program storage results to increased margin as well as independence from vagaries of supply chain and component availability.
2015-06-02 USB technology in a battery-powered IoT era
Here's a look at how the USB standard has evolved to a state-of-the-art technology that allows even small battery-powered devices for the IoT to communicate with anything.
2008-04-03 Two ICs inside HP scientific calculator
While not the sexiest consumer product out there, our engineering audience will likely see the appeal that Hewlett-Packard's latest scientific calculator.
2015-01-06 Smart gadgets rule CES Unveiled
If some of the products demonstrated at the pandemonium of CES Unveiled are any indication, this is a generation of gadgets designed to compete on simplicity, ease of use, accuracy and security.
2007-10-29 Smart card connectors protect against theft
Smart card connectors that deliver increased theft protection have been introduced by C&K Components.
2015-04-01 Significance of protecting enterprise security
Security can be attacked at every interface between human and machine, or machine and machine; it needs to be defended at every interface.
2013-07-01 Selecting RF protocols for ISM applications
Here are the pros and cons of each of the five leading RF protocols used for ISM applications.
2003-06-02 Security risks threaten FPGA designers
The rapidly growing importance of FPGAs and microprocessors in systems, plus increasing time-to-market pressures, has led to security being 'overlooked' in most systems.
2012-02-16 Security issues in next-gen automotive electronics
With the remote connectivity now made possible by telematics, critical systems could be maliciously infiltrated by exploiting vulnerabilities in the car's embedded systems.
2002-12-16 Security inadequate in RTOSs
Commercial entities must make their systems just as secure against internal attacks as military and government entities do, and the primary defense is the mechanisms residing in RTOSs.
2008-02-28 SecurID fob provides single-chip safety net
The SecurID generates a new code every 60s over the fob's lifetime, with the host-side solution synchronously calculating this moving target to stay in lockstep with the token.
2009-01-27 Secure supervisors provide multifaceted monitoring to ensure system security
This article describes many of the embedded security features in the various DS36xx secure supervisor products.
2007-01-16 RTOS girded up against cyberattacks
RTOS vendors have outlined ways to halt security breaches, foremost of which are application- and data-isolation techniques, upgrades to higher Evaluation Assurance Levels, and protocols such as Secure Sockets Layer and Secure Shell.
2008-02-13 Random number generator operates at 2Mbit/s
Toshiba says its physical RNG circuit achieves the world's highest output by area, and that it generates random numbers at a data rate of 2Mbit/s.
2002-11-13 Quantum encryption to spell doom for hackers
Quantum encryption pioneers promise to put the world's first uncrackably secure networks online by early 2003. Based on the quantum properties of photons, quantum encryption guarantees absolutely secure optical communications.
2006-04-17 Preventing code theft
Worried about letting your code out into the wild? Learn a few tricks to protect your code against piracy, industrial espionage and theft.
2005-11-23 Panelists weigh potential RFID security threats
Radio Frequency identification technology is facing network security challenges. That's the consensus from TechBiz Connection panelists participating in a discussion on RFID last week at an industry gathering in Irvine, Calif.
2014-12-17 Open source platforms afford infinite design capabilities
The availability of open-source software and, more recently, hardware targeting embedded applications means that access to high-quality engineering resources has never been greater.
2008-11-18 Nokia Siemens boosts China Mobile IP networks security
China Mobile Group Jiangsu Ltd has tapped Nokia Siemens Networks' solution to ensure reliable telecommunications service, provide a secure data experience to customers and help the operator realize new opportunities in its full service operation era.
2009-08-14 Nightstand clock gets open-source, Wi-Fi boost
The Chumby is a $200 Wi-Fi-connected personal Internet appliance that gets its information and applications through Chumby's Website following a simple online registration process that opens up access to so-called "widgets."
2013-04-24 MCU Reference design features embedded firewall
Zilog and Icon Labs teamed up to develop a microcontroller which features an embedded firewall that provides a critical layer of security that can block Internet-based threats.
2002-11-07 Magiq employs quantum technology for encryption
Magiq Technologies Inc. has employed quantum information processing techniques in its development of an uncrackable encryption system for communication lines, slated for delivery early next year.
Bloggers Say

Bloggers Say

See what engineers like you are posting on our pages.

?
?
Back to Top