Researchers at Ben-Gurion University of the Negev (BGU) have developed a new artificial intelligence solution that may protect medical devices from malicious operating instructions in a cyberattack, as well as from human and system errors.
As supply chain processes are increasingly more digitalized, they are more at risk from security threats. Companies should look to these newer and proven technologies to track and trace their packages and ensure product security.
Low-tech thieves can still hack car key fobs with easy to get hardware-software and poorly developed policies for on-board diagnostic protocols.
Bootloaders are often developed at the last minute despite the fact that they are often complicated to implement and create critical functionality for the system.
Hardware-based isolation creates a barrier that makes it difficult for hackers to get access to a system and its data.
There are many resources available to engineers to help them learn security and begin to implement it.
UL now offers security certification to help IoT device makers satisfy customer concerns and meet forthcoming state regulations.
Prioritizing security efforts – critical for the IoT to survive – may best be done by considering the value of transactions over the size of the network.
The big trends from Arm Techcon this year include security, pervasive multicore processors, and AI everywhere.
Here’s some summer reading to get embedded with. These books will school you in security, design, ARM, and architectural concepts.