Date Published: July, 27, 2015
Wired.com recently published a frightening account of how a typical automobile can be hacked and controlled (more here at http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/). In the test, a reporter in a late model Jeep experienced a series … READ MOREDate Published: July, 23, 2015
While crashed trains or planes, power plant meltdowns or chemical spills can - and have - occurred as a result of poor security in the Internet of Things, financial gains represent a huge target for attackers and thieves - whether individuals, organized c… READ MOREDate Published: July, 21, 2015
Here in Santa Clara at Embedded Systems Conference Silicon Valley (#ESCSV), the halls are filled with embedded systems designers trying to learn the latest in design, development, tools and technologies. For us here at Trusted Computing Group, it is grati… READ MOREDate Published: July, 20, 2015
TCG’s Trusted Network Connect, or TNC, is constantly evolving. Our scope addresses more solutions and more technologies than it did when we began our work a decade ago - and yet our goals are, fundamentally, the same objectives that we've had all along… READ MOREDate Published: July, 09, 2015
TCG members have been commenting to the recent news of international standards body approval for the TPM 2.0 Library Specification. The following post from Microsoft appears at http://blogs.microsoft.com/cybertrust/2015/06/29/governments-recognize-the-imp… READ MOREDate Published: June, 19, 2015
先日またもや大量の個人情報に関わる情報の漏洩が政府に近い組織で起こり社会の問題となっています。いわゆる匿名掲示板にその漏洩が公式にその組織から公表される前に内部からその事… READ MOREDate Published: June, 15, 2015
Let’s face it - for a long time, embedded systems were not that cool. A big business, but it did not have the glamour associated with PCs and then mobile devices. With the Internet of Things, suddenly things have changed. Everyone is talking about sens… READ MOREDate Published: June, 10, 2015
The most recent high-profile data breach, of government workers' personal information, has frustrated some cybersecurity experts. Many experts had previously pointed out a number of security issues to the agency that was breached. This breach joins many o… READ MOREDate Published: June, 08, 2015
For the last few years, Ponemon Institute has studied the impact of data breaches. This year, the report, available for download here from IBM (http://www-03.ibm.com/security/data-breach/) notes some disturbing trends. The per-record cost of a data breac… READ MOREDate Published: June, 04, 2015
The availability of connected devices and associated content is leading to an almost dizzying array of applications. Last week, we saw an ad for a connected toothbrush complete with tracking app. And while having all that data can be very useful and exiti… READ MORE