Global Sources
EE Times-Asia
Stay in touch with EE Times Asia
EE Times-Asia > Advanced Search > identity theft

identity theft Search results

?
?
total search28 articles
2016-02-19 Cyber theft amounts to millions in profits, study reveals
On average, a batch of 50 stolen credit or debit cards can make a seller between about $250,000 and $1 million, according to a study commissioned by the National Institute of Justice.
2008-04-10 Atmel, Guard ID fight online identity fraud
Atmel and Guard ID Systems are collaborating to bring to market products that efficiently protect consumers against online identity theft and fraud.
2013-02-12 Guarding R&D investment with secure authentication
Learn about Maxim's solution in the form of secure authenticators to meet application requirements.
2012-09-25 Enhance MCU performance, security with hardware accelerated crypto
Discover how to accelerate compute-intensive cryptographic algorithms and off load those tasks from the ARM core.
2004-07-15 Infineon chip card controllers provide foolproof security
Infineon announced that it will be offering new chip card controllers for improved security of electronic identity cards and passports
2010-01-25 NXP, Intrinsic-ID team to boost chip security
NXP will utilize Intrinsic-ID's Quiddikey solution to secure SmartMX-powered assets against cloning, tampering, theft-of-service and reverse engineering
2008-11-07 Validus taps IMI for powered cards
Integrated Microelectronics Inc. (IMI) and Validus Technologies Corporation are pleased to announce a strategic manufacturing alliance serving the global powered card industry.
2005-07-14 STMicro produces computing solutions for motherboard makers
The company announced volume production of the ST19WP18 TPM, and confirmed that more than one million of the Trusted Computing Group 1.2 devices, complete with software stack, have already been delivered in Q2 2005.
2013-11-20 Smart card offers security for banking, eGov markets
NXP's SmartMX2-P40 offers dedicated co-processors for asymmetric RSA/ECC and symmetric DES/AES cryptography, and comes with a certified hardware abstraction layer and crypto library.
2008-10-14 Semicast: Consumer electronics to achieve steady growth
The market for 32-/64bit MCUs, embedded microprocessors and general purpose DSPs will show steady and on-going growth despite the current economic uncertainties, particularly affecting confidence in the United States, Europe and Japan.
2015-08-21 Price erosion afflicts MCU market
IC Insights said MCU shipments are on pace to increase by a whopping $25.4 billion in 2015, but unprecedented price erosion means MCU vendors are seeing only a slight increase in sales.
2007-05-16 Notebook HDD provides 200Gbyte, encryption tech
Hitachi Global Storage Technologies (Hitachi GST) unveiled what it claims as the industry's highest-capacity, highest-performing notebook hard disk drive (HDD) featuring new optional data encryption technology, the Travelstar 7K200.
2006-10-02 Media-oriented networks require CMPs
Communications and media processors meet the stringent requirements needed for delivering multimedia content.
2006-01-26 Fingerprint sensor upgrades with advanced security
AuthenTec has unveiled the EntrePad 1610 with advanced biometric security and a small footprint for portable applications such as notebook and tablet PCs.
2015-02-16 Why is Android an easy target for malware infections?
Android phones and tablets are responsible for about 50 per cent of the malware infections observed. Android offers the easiest target for this because of its open app environment.
2004-10-18 Trusted platform modules eye embedded
TPMs implement trusted-computing security objectives in a low-power, high-performance hardware/software combination.
2004-07-02 TI, ARM team to secure wireless transactions
Texas Instruments Inc. and ARM Ltd are combining their respective Omap and TrustZone technologies to develop a silicon-based system for secure wireless transactions.
2011-05-27 NXP, Intrinsic-ID team up for security solution
NXP and Intrinsic-ID announced a collaborative agreement to deploy a hardware intrinsic security (HIS) solution in NXP's next SmartMX security chip technology.
2011-08-29 Non-profit fights for property rights protection
AGMA members are determined to fight piracy, as well as warranty and service abuse around the world.
2013-01-22 M2M communication: Enduring extreme conditions
Here are some SIM design options that can survive the heat or cold.
2012-10-02 Intel, partners reveal Atom based Win8 tablets
Intel's Atom Processor Z2760 allows for the thinnest, lightest tablets built on Intel architectureas thin as 8.5mm and as light as 1.5 pound.
2012-06-14 Intel introduces next-gen of ultrabooks
Intel has detailed the next-generation of ultrabooks that boasts of higher responsiveness and enhanced security.
2015-01-23 How to secure the Internet of Things (Part 1)
Find out how to how to identify and then assess the security risks for a connected electronic device, and how security is designed into electronic devices, with focus on public key-based algorithms.
2005-04-18 How safe is private data on cell?
The recent hacking of Paris Hilton's address book-stored on the TV celebrity's Sidekick II smart phone and backed up by T-Mobile's server-has raised questions in the engineering community about whether personal data is adequately protected in the current generation of cellular products.
2007-05-14 Establishing mobile security
Every company in the mobile technology community should start considering how to proceed to take advantage of the MTM specification and to implement improved security in their next-generation products.
2005-02-04 Discretix broadens solutions with Virage embedded memory
Discretix and Virage Logic Corp. are cooperating to provide an advanced solution for securing sensitive data in mobile storage devices.
2012-11-05 Address power, security issues with antifuse tech
Learn how to resolve the new constraints of battery-powered system-on-chip design.
2012-10-02 'Puffin' gives intrinsic security for gamers,phones
The 'Puffin' project has already found that software can detect the die-specific differences in graphics processors.
Bloggers Say

Bloggers Say

See what engineers like you are posting on our pages.

?
?
Back to Top