Chip Security
  • Email
  • Home
  • News
  • Reports
  • Opinion
  • Tools
  • About

Combating fake chips by controlling supply chain

Posted on October 30, 2012 by John in News

In December 2011, President Barack Obama signed the fiscal year 2012 US National Defense Authorization Act. The budget bill also encourages the implementation of procedures to mitigate the possibility of obtaining counterfeit components by making members of all tiers of the defense supply chain accountable. The meaning of the term counterfeit in this context includes [...]

  • Share this:
  • Share
  • Digg
  • Facebook
  • Email
  • Print
chips, counterfeit, fake, parts

Hey Congress, Smart Phones are Just the Start…

Posted on October 14, 2012 by John in News, Opinion
Hey Congress, Smart Phones are Just the Start…

From “The Hill“… “It is critical to understand that these two Chinese handset manufacturers are not the only companies that should remain under suspicion. There are many memory chips, currently being manufactured by Chinese companies, which are inaccessible. This means that these chips may contain code that we will never be able to access, function [...]

  • Share this:
  • Share
  • Digg
  • Facebook
  • Email
  • Print

Maxim SoC targets smart grid security

Posted on October 9, 2012 by John in News

PARIS – Maxim Integrated Products said it has launched Zeus, a smart meter SoC for embedded smart grid equipment that needs to measure and to communicate securely. Maxim said Zeus supports various security and communication requirements. A built-in cryptographic module secures communication; a secure bootloader prevents unauthorized firmware modification; and tamper detection assures providers that [...]

  • Share this:
  • Share
  • Digg
  • Facebook
  • Email
  • Print
embedded, grid, Maxim, power, Security, smart, system-on-chip

Huawei, ZTE, and Chinese Investment in the U.S. – Businessweek

Posted on October 8, 2012 by John in News

A congressional report released Oct. 8, alleging that China’s two largest telecom equipment manufacturers, Huawei Technologies and ZTE, are a security threat and should be blocked from acquiring U.S. companies. “Based on available classified and unclassified information, Huawei and ZTE cannot be trusted to be free of foreign state influence and thus pose a security [...]

  • Share this:
  • Share
  • Digg
  • Facebook
  • Email
  • Print
congress, cyber, national security, report, US

US Congress report red-flags major Chinese telecom companies as security threat – The Times of India

Posted on October 8, 2012 by John in News

WASHINGTON/HONG KONG: China’s top telecoms gear makers should be shut out of the US market as potential Chinese state influence on them poses a security threat, the US House of Representatives’ intelligence committee said in a draft of a report to be released on Monday.US intelligence must stay focused on efforts byHuawei Technologies Co Ltd and ZTE [...]

  • Share this:
  • Share
  • Digg
  • Facebook
  • Email
  • Print
congress, Espionage, house, Huawei, report, representatives, US, ZTE

Hackers shifting to ‘destruction’: US cyber chief | DAWN.COM

Posted on October 7, 2012 by John in News

WASHINGTON, Oct 1, 2012 - Hackers are stepping up the intensity of their attacks, moving from “disruption” to “destruction” of key computer systems, the top US cyber-defense official said Monday. General Keith Alexander, who is director of the National Security Agency and commander of the US Cyber Command, told a Washington forum that the new tactics [...]

  • Share this:
  • Share
  • Digg
  • Facebook
  • Email
  • Print
command, cyber, destruction, hackers

Counterfeit Chips Continue Record Highs

Posted on October 6, 2012 by John in News

U.S. defense representatives are set to update rules governing the acquisition of electronic components by the military Wednesday (Oct. 3) in an effort to thwart an epidemic of counterfeit parts which has continued at an unprecedented pace thus far in 2012, according to market research firm IHS iSuppli. Reported incidents of counterfeit electronic parts have [...]

  • Share this:
  • Share
  • Digg
  • Facebook
  • Email
  • Print

White House Hack Attack

Posted on October 1, 2012 by John in News

Hackers linked to China’s government broke into one of the U.S. government’s most sensitive computer networks, breaching a system used by the White House Military Office for nuclear commands, according to defense and intelligence officials familiar with the incident. One official said the cyber breach was one of Beijing’s most brazen cyber attacks against the [...]

  • Share this:
  • Share
  • Digg
  • Facebook
  • Email
  • Print
China, hack, nuclear, secure, senkaku, white house

New Android Malware Is A Burglar’s Best Friend

Posted on October 1, 2012 by John in News

Newly released malware PlaceRaider sounds like science fiction: It’s Android malware designed to build 3-D models of users’ apartments for burglars and assassins. But PlaceRaider–developed by a team at Indiana University–is very real. The new malware was built as an academic exercise, and it exposes security flaws that government agencies would love to use. More [...]

  • Share this:
  • Share
  • Digg
  • Facebook
  • Email
  • Print
android, malware, trojan

CIO-Asia – Intel hopes McAfee security features will differentiate mobile chips

Posted on September 19, 2012 by John in News

“We can hardcode the service directly to our silicon,” James said. “When it’s an Intel processor we can actually do specific middleware extensions that connect to their service that just activate the hardware.” via CIO-Asia – Intel hopes McAfee security features will differentiate mobile chips. Editor’s note: A big step forward…if, long-term, Intel keeps 3-D [...]

  • Share this:
  • Share
  • Digg
  • Facebook
  • Email
  • Print
  • ‹
  • 1
  • 2
  • 3
  • 4
  • ›
  • »

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Sponsored by

Cyberterrorism Techno-thriller

Recent Posts

  • Design for Security: Needed More than Ever
  • New DARPA Program Seeks to Reveal Backdoors and Other Hidden Malicious Functionality in Commercial IT Devices
  • Electrical testing to track fake military parts
  • DOD requirement to mark parts with unique DNA
  • Toshiba adds IP protection to automotive MCUs

Recent Comments

    (c) 2012 Chip Security - Web Design by Blue Mustang

    loading Cancel
    Post was not sent - check your email addresses!
    Email check failed, please try again
    Sorry, your blog cannot share posts by email.