X-sense Smart Home Security Kit – Quick Review
Products

X-sense Smart Home Security Kit – Quick Review

Introduction There are many reasons to invest in a home security system especially in today's day and age - from providing total security of valuables to having the security of persons, and eventually to have that peace of mind that comes with knowing that everything is under your...

Continue Reading
1.146
Views
1 Comments
Perform Power Analysis Side-Channel Attacks with the ChipWhisperer-Nano
Mcu

Perform Power Analysis Side-Channel Attacks with the ChipWhisperer-Nano

If you have ever considered the option of using encryption in your design, then you should be able to perform a side-channel attack as well as understand the consequences of such an attack on your product. While oscilloscopes and differential probes can be helpful in traditional power...

Continue Reading
6.291
Views
0 Comments
Signet High-Capacity Thumb-drive, Your Libre Personal Information Security Multi-tool
USB

Signet High-Capacity Thumb-drive, Your Libre Personal Information Security Multi-tool

Signet HC is a secure USB drive built with open-hardware and free open-source software. It is an encrypted flash drive, a two-factor authentication (2FA) device and a hardware password and personal information manager, making it a portable solution to a variety of data security...

Continue Reading
2.685
Views
0 Comments
Variscite Releases Headless Version of Its Linux-friendly DART-6UL CoM
SBC

Variscite Releases Headless Version of Its Linux-friendly DART-6UL CoM

Variscite is releasing another pin-compatible version of their 50 x 25mm DART-6UL computer-on-module. This time it will be loaded with NXP’s headless new i.MX6 ULZ variant of the single Cortex-A7 core i.MX6 UL. This yet unnamed module lacks display or LAN support. It is described...

Continue Reading
3.935
Views
0 Comments
YubiKey Provides An Easy And Safe Way To Secure Your Online Logins
USB

YubiKey Provides An Easy And Safe Way To Secure Your Online Logins

Regardless of how strong a password is, or what level of code-based authentication a website is using, any system that sends codes in a text message can be hacked by a skilled hacker. The most secure way to set up two-factor authentication is to use a reliable app on a smartphone to...

Continue Reading
4.868
Views
0 Comments
Face Recognition Chip revolutionizing Smartphone Security
Sensor

Face Recognition Chip revolutionizing Smartphone Security

Back in 2007 Apple released the first generation of iPhone which is considered as the first smartphone as those we use today. Before that, PDAs (Personal Digital Assistants) dominated the market and some even included network connectivity, the ability to send and receive calls, and...

Continue Reading
3.728
Views
0 Comments
Drones- A Blessing or a Curse?
RF

Drones- A Blessing or a Curse?

The increasing popularity of unmanned aerial vehicles (drones) has created a lot of security issues and possible privacy threats. Drone manufacturers have made them easy to fly so that any person without any experience can buy one and fly it without reading the instruction manual first....

Continue Reading
4.263
Views
0 Comments
Open IoT Certification Mark – A New Certification For IoT Products
IoT

Open IoT Certification Mark – A New Certification For IoT Products

So it’s the time to witness the birth of a new certification for IoT industry. As security and data privacy in IoT platforms and products are two of the main concerns for developers and end-users, the new certificate discuss these concerns and even more. IoT is yet to have such...

Continue Reading
3.374
Views
0 Comments
Get new posts by email:
Get new posts by email:

Join 97,426 other subscribers

Archives