
When a Chip Just Isn’t a Chip
When most people imagine counterfeit goods, they tend to picture the ‘Rolax’ watch that you can buy from that somewhat shady guy behind the local
Home > Provisioning & Key Management > Page 2
When most people imagine counterfeit goods, they tend to picture the ‘Rolax’ watch that you can buy from that somewhat shady guy behind the local
Helena Handschuh wrote a recent article in EE Times stating that “with the proliferation of intelligent devices, the industry needs new robust security approaches instead
Hacking a Tesla The past few weeks have been a busy time for white hat hackers demonstrating cyber-security vulnerabilities in connected vehicles. Firstly, Keen Labs
The burning question in some security scientists’ minds these days is: “Will post-quantum cryptographic algorithms be necessary in the future?” Hanno Böck writes in the
Meltdown and Spectre microprocessor vulnerabilities took top billing in ComputerWeekly.com’s top 10 IT security stories of 2018. Discovery of these and several similar vulnerabilities “were
Around this time last year, two vulnerabilities known as Meltdown and Spectre became public. Discovered independently by multiple research teams, each flaw exposed critical vulnerabilities