Global Sources
EE Times-Asia
Stay in touch with EE Times Asia
EE Times-Asia > Advanced Search > security system attack

security system attack Search results

?
?
total search97 articles
2002-12-16 Security inadequate in RTOSs
Commercial entities must make their systems just as secure against internal attacks as military and government entities do, and the primary defense is the mechanisms residing in RTOSs.
2004-10-18 Seeking security at the network edge
By moving the management of security services to the network edge, many technical and business challenges can be solved
2003-06-02 Security risks threaten FPGA designers
The rapidly growing importance of FPGAs and microprocessors in systems, plus increasing time-to-market pressures, has led to security being 'overlooked' in most systems
2012-07-26 Maxim's security manager ensures smart grid infrastructure security
Maxim Integrated Products' MAX36025 adds secure encryption to critical points of data aggregation within the smart grid.
2013-04-29 Tilera's cyber security building blocks ready for 100Gbit/s
The security on Tilera's TILE-Gx processors have been bolstered with the MDE software tool suite and an array of powerful application building blocks that enable customer solutions
2014-09-04 Thwarting IoT security threats with ARM TrustZone
Virtualisation can be leveraged to enable consolidation of connected devices, and ARM TrustZone can be utilised to tackle security threats to the Internet of Things
2002-11-25 Suppliers to add security features to wireless comm chips
Infineon Technologies AG has made a strategic decision to put security features into its wireless-modem chips
2012-02-16 Security issues in next-gen automotive electronics
With the remote connectivity now made possible by telematics, critical systems could be maliciously infiltrated by exploiting vulnerabilities in the car's embedded systems.
2008-06-25 Researchers tip open-source smart card to tighten security
Dutch philanthropic foundation, NLnet, has offered $230,000 to fund a project that will devise open-source smart card software that provides stronger protection of personal data.
2003-11-03 Protocol stacks are Achilles' heel of net security
The key to preventing network attacks is to understand and capitalize on the weak points of the protocols that power them.
2004-10-01 Partitioning helps build system reliability
True partitioning should include not only protecting the kernel and application code, but also the communication stack.
2008-11-19 OS gains top security certification
Green Hills Software has announced that its Integrity-178B operating system has achieved EAL6+ certification, the highest level of proven security for any OS to date
2008-09-12 NXP security chips smash speed record for eGovernment deals
NXP Semiconductors claims that its latest SmartMX security chip, the P5CD081, is the industry's highest performance contactless IC for ePassport and electronic identification applications
2007-11-06 NXP chips enhance German ePassport security
NXP Semiconductors announced it will supply its latest smart chip technology to Germany, the first country in the world to introduce second-generation ePassports with enhanced security
2013-11-14 Microsemi unveils advanced security IP block
With EnforcIT Security Monitor, SmartFusion2 and IGLOO2 devices can be easily configured to interface with hardware security mechanisms built into the silicon of these FPGAs
2011-09-14 IPv6 solution ensures infrastructure security
The Peakflow SP 5.6 combines network-wide anomaly detection and traffic monitoring, while maintaining performance.
2006-11-01 Intrusion detection, prevention boost switching system
Trapeze Networks Inc. has added the intrusion detection/prevention system of its OEM partner AirDefense Inc. into its Mobility System 5.0
2015-07-31 Improving industrial cyber security one layer at a time
Although Industrial Internet of Things affords improvement in efficiencies and optimisation, there still remains cyber security issues that need to be addressed
2005-06-06 IEEE 802.11i and wireless security
IEEE's wireless security amendment adds stronger encryption, authentication, and key management strategies that go a long way toward guaranteeing data and system security
2014-05-28 Heartbleed's impact on Internet, embedded security
Majority of publications on Heartbleed have focused on the security of consumers' usernames and passwords. It should, however, also make us reflect on how we should secure our embedded designs
2014-12-08 Hacker attack on Sony sheds light on total system invasion
The company is still reeling from a data breach and a wiper attack since they began Nov. 24, exposing sensitive and confidential data and intellectual property, as well as client information
2013-11-21 Ensuring the security of connected cars
Learn about some of the ways to manage data exchange and processing in connected cars.
2007-02-01 Ensure strong security in mobile transactions
Mobile handsets are being looked to increasingly act as transactional mechanisms. But before we reach that point of complete convergence, there is the issue of security that needs to be addressed first
2014-06-02 Ensure complete smart meter life-cycle security
This article tracks a smart meter from manufacture, to installation and initial operation, and through its service life. It looks at the security threats faced by such devices
2012-07-03 Enhancing embedded OS security
Here are some security best practices that embedded system developers need to consider in their designs
2002-12-16 Embedding security into servers
As embedded systems that control critical systems connect to the Internet, embedded developers need to concern themselves with security as well as reliability
2003-04-01 DVR, biometrics lead the security industry
The article will focus on the physical aspect of security, particularly digital video recorders, which has a high growth potential
2015-12-15 Designing security framework for IoT devices
To secure IoT devices, designers need a comprehensive security framework that provides enterprise-level security in these small devices. Find out how this can be achieved
2008-11-03 Composites beat steel as surveillance system case
In designing a wireless pole camera system for digital video surveillance, Boundless Security Systems has chosen to use composite over steel for its cabinet
2009-10-22 China preps ePassport system
NXP is involved in more than 80 percent of all ePassport schemes, having shipped about 150 million ICs to date.
Bloggers Say

Bloggers Say

See what engineers like you are posting on our pages.

?
?
Back to Top