Tag: Security
Renesas RX260 and RX261 Microcontrollers Deliver High Efficiency and Advanced Touch Features with Security Functions
Renesas has recently introduced the RX260 and RX261, 32-bit microcontrollers designed for outstanding power efficiency, advanced touch functions, and robust security. Built on the RXv3 core, they deliver high performance of 355 CoreMark at 64MHz, with ultra-low active current...
Continue ReadingX-sense Smart Home Security Kit – Quick Review
Introduction There are many reasons to invest in a home security system especially in today's day and age - from providing total security of valuables to having the security of persons, and eventually to have that peace of mind that comes with knowing that everything is under your...
Continue ReadingPerform Power Analysis Side-Channel Attacks with the ChipWhisperer-Nano
If you have ever considered the option of using encryption in your design, then you should be able to perform a side-channel attack as well as understand the consequences of such an attack on your product. While oscilloscopes and differential probes can be helpful in traditional power...
Continue ReadingSignet High-Capacity Thumb-drive, Your Libre Personal Information Security Multi-tool
Signet HC is a secure USB drive built with open-hardware and free open-source software. It is an encrypted flash drive, a two-factor authentication (2FA) device and a hardware password and personal information manager, making it a portable solution to a variety of data security...
Continue ReadingVariscite Releases Headless Version of Its Linux-friendly DART-6UL CoM
Variscite is releasing another pin-compatible version of their 50 x 25mm DART-6UL computer-on-module. This time it will be loaded with NXP’s headless new i.MX6 ULZ variant of the single Cortex-A7 core i.MX6 UL. This yet unnamed module lacks display or LAN support. It is described...
Continue ReadingYubiKey Provides An Easy And Safe Way To Secure Your Online Logins
Regardless of how strong a password is, or what level of code-based authentication a website is using, any system that sends codes in a text message can be hacked by a skilled hacker. The most secure way to set up two-factor authentication is to use a reliable app on a smartphone to...
Continue ReadingFace Recognition Chip revolutionizing Smartphone Security
Back in 2007 Apple released the first generation of iPhone which is considered as the first smartphone as those we use today. Before that, PDAs (Personal Digital Assistants) dominated the market and some even included network connectivity, the ability to send and receive calls, and...
Continue ReadingDrones- A Blessing or a Curse?
The increasing popularity of unmanned aerial vehicles (drones) has created a lot of security issues and possible privacy threats. Drone manufacturers have made them easy to fly so that any person without any experience can buy one and fly it without reading the instruction manual first....
Continue Reading