Quantcast
Channel: Embedded Security and DRM: Automotive, Mobile Device and Home Entertainment
Browsing latest articles
Browse All 27 View Live

Image may be NSFW.
Clik here to view.

GlobalPlatform Trusted Execution Environment Conference

Hyatt Regency Santa Clara Hotel & Conference Center October 31st 2013 To schedule a meeting please contact events-dx@discretix.com Click here for the conference site:...

View Article


Hard disk as a computer

Leaving aside the platters and mechanics, a hard disk contains megabytes of RAM and several processor cores that execute programs stored on internal flash. Since the programs can be changed from the...

View Article

Image may be NSFW.
Clik here to view.

Digital Media and DRM Summit

August 20th, 2013 For more information and to schedule a meeting Please contact events-dx@discretix.com Click here for the conference site: http://www.marlin-community.com/news-events

View Article

Yet another RNG SNAFU

Last month we wrote: If you are watching the security engineering field long enough, you can easily recall a dozen more cases, where an RNG shortcoming made a supposedly secure system a complete...

View Article

Image may be NSFW.
Clik here to view.

IBC 2013

Amsterdam RAI Exhibition and Congress Centre September 13 – 17 2013 For more information and to schedule a meeting Please contact events-dx@discretix.com Click here for the conference site:...

View Article


Weird machines

Roughly speaking there are two types of computer programs: the programs represented by CPU instructions (native code) and the programs executed (interpreted) by other programs (class files executed by...

View Article

Limits of white lists

One way to avoid malware on your system is to make a white list of known-good applications and disallow installation and execution of everything else. This sounds like a bullet-proof solution, but the...

View Article

Bluetooth: With Low Energy comes Low Security

When the Bluetooth Core Specification Version 4.0 was adopted in 2010, Bluetooth low energy was merged into it. Key features of Bluetooth low energy wireless technology include: Ultra-low peak, average...

View Article


Cloning contactless credit cards

All major credit card brands adopted EMV Contactless Specifications for Payment Systems based on the ISO/IEC 14443 standard for proximity integrated circuit cards. Contactless cards can be more...

View Article


Protecting private data: with law or with technology?

There is an ongoing debate on the need for new regulations that protect individuals’ personal data. Regulation is said to be required to protect the personal data of citizens, consumers, patients,...

View Article
Browsing latest articles
Browse All 27 View Live