Swissbit iShield FIDO2 Hardware Authenticator
USB

Swissbit iShield FIDO2 Hardware Authenticator

Swissbit iShield FIDO2 Hardware Authenticator offers simple, secure, and flexible authentication and protects users against online attacks, such as phishing, social engineering, and account takeover. This authenticator features robust hardware-based authentication using asymmetric...

Continue Reading
1.261
Views
0 Comments
MIT Researchers Develop An ASIC To Defend Against Power-based Side Channel Attacks
IoT

MIT Researchers Develop An ASIC To Defend Against Power-based Side Channel Attacks

A team of researchers affiliated with MIT School of Engineering, Indian Institute of Science, and Analog Devices have collaborated to design a tiny application-specific integrated circuit (ASIC) to defend against power-based side-channel attacks on an IoT device. Before getting into the...

Continue Reading
1.275
Views
0 Comments
Kryptor FGPA is a Hardware Security Module that adds Complex Open-source Encryption
FPGATop Stories

Kryptor FGPA is a Hardware Security Module that adds Complex Open-source Encryption

Designed for processors that support serial interfaces, the one-chip module offers all the functionalities of a dedicated HSM within a single compact MAX10 FPGA chip. The new release from Skudo is a professional FGPA development board built as an encryption solution to project boards...

Continue Reading
3.676
Views
0 Comments
YubiKey Provides An Easy And Safe Way To Secure Your Online Logins
USB

YubiKey Provides An Easy And Safe Way To Secure Your Online Logins

Regardless of how strong a password is, or what level of code-based authentication a website is using, any system that sends codes in a text message can be hacked by a skilled hacker. The most secure way to set up two-factor authentication is to use a reliable app on a smartphone to...

Continue Reading
4.887
Views
0 Comments
Embedded Cryptography For Internet Of Things Security
HardwareIoTTechnology

Embedded Cryptography For Internet Of Things Security

As Internet of Things (IoT) devices are optimized for lower power consumption and affordability, most of them have poor computing resources. As consequence, these devices are more vulnerable to hacking attacks. The good news is there are several options for using cryptography to make it...

Continue Reading
6.178
Views
0 Comments
Get new posts by email:
Get new posts by email:

Join 97,426 other subscribers

Archives