Quantcast
Channel: Chip Security
Browsing latest articles
Browse All 10 View Live

NIST spells out baseline security requirements for next-gen mobile devices

Necessary, but sufficient? From Government Computer News: “The adoption of mobile devices in the workplace has outstripped the ability of smart phones and tablets to support basic security features...

View Article



Fake tech gear has infiltrated the U.S. government

A record number of tech products used by the U.S. military and dozens of other federal agencies are fake. That opens up a myriad of national security risks, from dud missiles to short-circuiting...

View Article

Morning Bell: Cybersecurity: Do You Trust the Government with Your Computer?

“…Simply put, government regulations usually take 24–36 month to complete, but the power of computers doubles every 18–24 months. This means that any standards developed will be written for threats...

View Article

Huawei, Altera mix FPGA, memory in 2.5-D device

Huawei and Altera will package an FPGA and a Wide I/O memory on a 2.5-D silicon interposer to bust through memory bandwidth limits in communications systems. The technology presents thorny challenges...

View Article

Report calls China biggest cyberthreat

Ongoing Chinese cyberattacks on U.S. industry and government present a significant threat and the Defense Department should consider its ability to exclude “any foreign-produced equipment” that could...

View Article


Image may be NSFW.
Clik here to view.

Toshiba adds IP protection to automotive MCUs

Toshiba has revealed a security module for automotive microcontrollers meeting industry anti-hacking, anti-tamper and software theft standards. Developed at the company’s automotive development centre...

View Article

DOD requirement to mark parts with unique DNA

A new anti-counterfeiting requirement from the U.S. Defense Logistics Agency (DLA) at Fort Belvoir, Va., is triggering pushback from semiconductor manufacturers, who claim the new requirement is not an...

View Article

Electrical testing to track fake military parts

Counterfeit electronic components are an increasing threat to the supply chain for consumer, industrial and, more importantly, military parts. Some counterfeit parts are like counterfeit money,...

View Article


New DARPA Program Seeks to Reveal Backdoors and Other Hidden Malicious...

The Defense Advanced Research Projects Agency (DARPA) Information Innovation Office (I2O) will conduct a briefing in support of the anticipated Broad Agency Announcement (BAA) for the VET – Vetting...

View Article


Design for Security: Needed More than Ever

Tro·jan noun \trō-jən\[1] 1 : someone or something that is used to hide what is true or real in order to trick or harm an enemy 2 computers : a seemingly useful computer program that is actually...

View Article
Browsing latest articles
Browse All 10 View Live




Latest Images