close
close
close
Home Tags Security

Tag: security

Q. What would you say is the most interesting trend that you have observed about producing secure and safe software? A. One of the many things that has become obvious to me over the years is the fact that you...
You can use this simple and reliable digital security system as a watch dog by installing the sensing loops around your building. You have to stretch the loop wires two feet above the ground to sense the unauthorised entry...
Following the trend in improving security in our electronic systems, ESSS marked a major landmark in hosting security experts from all around the globe. The event addressed the interdependence of safety and security in mission critical systems. LDRA in...
Presented here is a 6v Laser security system that can be easily programmed for any password. This project powered using a mobile charger which gives 6 volts and 500 mA. It can also powered using battery ranging 6 volts....
The Industrial IoT (IIoT), a subset of the IoT evolution, is quite the rage within automation companies as they seek to add a high-margin software component to their traditional businesses. Since Maxim Integrated chips are used to build these...
Now is the age of online shopping and home delivery. In this context, we often hear stories about things not going the way they ought to. A customer replaced original products with dummy ones and returned those to a...
Billions of connected devices security are potentially at risk unless security sensitive software can be managed to an e-commerce standard, according to a group of leading technology security experts. The companies, including ARM, Intercede, Solacia and Symantec worked together to...
While the move to smaller transistors has been a boon for performance it has dramatically increased the cost to fabricate chips using those smaller transistors. This forces the vast majority of chip design companies to trust a third party,...
Data on the cloud provides an ease of use. We can access it over our phone, tablet, laptop or any other computing device. This ease of working on the data from any device also brings along with several questions,...
A geek or a nerd glaring at a green tinted computer screen used to be the visual that defined the action of hacking into secure electronics. Every movie ran with that concept whenever they needed to depict a hacker. Looks...