GlobalPlatform Trusted Execution Environment Conference
Hyatt Regency Santa Clara Hotel & Conference Center October 31st 2013 To schedule a meeting please contact events-dx@discretix.com Click here for the conference site:...
View ArticleHard disk as a computer
Leaving aside the platters and mechanics, a hard disk contains megabytes of RAM and several processor cores that execute programs stored on internal flash. Since the programs can be changed from the...
View ArticleDigital Media and DRM Summit
August 20th, 2013 For more information and to schedule a meeting Please contact events-dx@discretix.com Click here for the conference site: http://www.marlin-community.com/news-events
View ArticleYet another RNG SNAFU
Last month we wrote: If you are watching the security engineering field long enough, you can easily recall a dozen more cases, where an RNG shortcoming made a supposedly secure system a complete...
View ArticleIBC 2013
Amsterdam RAI Exhibition and Congress Centre September 13 – 17 2013 For more information and to schedule a meeting Please contact events-dx@discretix.com Click here for the conference site:...
View ArticleWeird machines
Roughly speaking there are two types of computer programs: the programs represented by CPU instructions (native code) and the programs executed (interpreted) by other programs (class files executed by...
View ArticleLimits of white lists
One way to avoid malware on your system is to make a white list of known-good applications and disallow installation and execution of everything else. This sounds like a bullet-proof solution, but the...
View ArticleBluetooth: With Low Energy comes Low Security
When the Bluetooth Core Specification Version 4.0 was adopted in 2010, Bluetooth low energy was merged into it. Key features of Bluetooth low energy wireless technology include: Ultra-low peak, average...
View ArticleCloning contactless credit cards
All major credit card brands adopted EMV Contactless Specifications for Payment Systems based on the ISO/IEC 14443 standard for proximity integrated circuit cards. Contactless cards can be more...
View ArticleProtecting private data: with law or with technology?
There is an ongoing debate on the need for new regulations that protect individuals’ personal data. Regulation is said to be required to protect the personal data of citizens, consumers, patients,...
View Article