32-Bit MCU for Bluetooth 5.0 with Enhanced Security & Privacy
Renesas Electronics introduced the RX23W – a 32-bit microcontroller (MCU) featuring Bluetooth® 5.0 for IoT endpoint devices such as home appliances and...
Two-year study explores the roles of information security leaders and how they are affected...
Synopsys, Inc. today published the inaugural CISO Report, the result of a two-year data-driven study exploring the roles of information security leaders and the organizational...
How Near Field Communication NFC Top 5 Security Issues will Make You Think twice
The connectivity trivia goes all the way from the pigeons to Wi-Fi, and presently, the Near Field Communication. Is your latest smartphone or Payment...
Thales & Tata Communications to develop Global IoT security solution
Thales and Tata Communications are working together to develop a secure global IoT connectivity solution. Tata Communications MOVE mobility and IoT platform...
Hackers target home Wi-Fi routers to steal data
In this article, a digital privacy expert explains how Wi-Fi routers get hacked nowadays and what users can do to protect themselves.
Infineon OPTIGA Trust M IoT Development Kit for Security Applications now at Mouser
Mouser Electronics is now stocking the OPTIGA Trust M IoT Development Kit for Security Applications from Infineon Technologies. The OPTIGA Trust M...
STMicroelectronics brings Certified Solution for Asset Identification & Brand Protection
Introducing new features to secure data exchanges in increasingly aggressive contexts, the STMicroelectronics STSAFE-A110 Secure Element protects consumer and industrial connected devices...
Home Security Technologies Every Homeowner Needs
Facial Recognition Doorbells
Facial recognition doorbells are a perfect example of technology and security integration. These doorbells can recognise...
New Vulnerabilities Soar, OT Attacks on the Rise and Cryptominers Reign Supreme, According to...
Skybox Security today announced the release of its latest Vulnerability and Threat Trends Report which analyzes the vulnerabilities, exploits and threats in play over the previous year....
Contactless payments: secure technology or back door for fraud?
Everything you need to know before you decide to make the switch to chip readers and smartphone-based payment systems-Over the past several years, contactless...