Tag: security
MAS Asks Banks to Consider Seniors in Anti-Scam Measures, SRF Inclusion Possible
by Fintech News Singapore November 7, 2023 The Monetary Authority of Singapore (MAS) has asked banks to assess and implement customer authentication mechanisms that are more resistant [more…]
Understanding Memory Protection Units
Let’s talk about the various security measures we take to protect our homes. We use locks, install security cameras to detect any suspicious activities, etc., all to [more…]
Securing AI/ML Training And Inference Workloads
AI/ML can be thought about in two distinct and essential functions: training and inference. Both are vulnerable to different types of security attacks and this blog will [more…]
Data Leakage In Heterogeneous Systems
Semiconductor Engineering sat down with Paul Chou, senior director of security architecture at NVIDIA, to discuss data leakage in heterogeneous designs. What follows are excerpts of that [more…]
Designing Automotive ICs For Cybersecurity
The day has already arrived when we need to be concerned about the cybersecurity of our cars. An average modern car includes about 1400 ICs and many [more…]
Stolen Identities Remains Top Security Threat in Financial Crime
by Johanan Devanesan November 2, 2023 Stolen identities of workers or other authorised users are sometimes enough to provide attackers with entry to internal systems and sensitive [more…]
2023 Open Source Security And Risk Analysis Report
The annual “Open Source Security and Risk Analysis” (OSSRA) report, now in its 8th edition, examines vulnerabilities and license conflicts found in roughly 1,700 codebases across 17 [more…]
A New Architecture And Verification Approach For Hardware Security Modules
A technical paper titled “The K2 Architecture for Trustworthy Hardware Security Modules” was published by researchers at MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) and New [more…]
44% of Companies Still at Beginning of Identity Security Journeys
by Fintech News Singapore October 30, 2023 Despite the fact that identity-related breaches account for 90% of cybersecurity breaches, a new report finds that 44% of companies [more…]
Analyzing The U.S. Advanced Packaging Ecosystem With Countermeasures To Mitigate HW Security Issues
A technical paper titled “US Microelectronics Packaging Ecosystem: Challenges and Opportunities” was published by researchers at University of Florida, University of Miami, and Skywater Technology Foundry. Abstract: [more…]
Jumio Unveils New AI-Powered Fraud Prevention Tool
by Fintech News Singapore October 24, 2023 Jumio, a provider of identity verification and fraud prevention solutions, has announced the launch of Jumio 360° Fraud Analytics. This [more…]
Governing the ML lifecycle at scale, Part 1: A framework for architecting ML workloads using Amazon SageMaker
Customers of every size and industry are innovating on AWS by infusing machine learning (ML) into their products and services. Recent developments in generative AI models have [more…]
Crypto Bro: Ryan James Crawford “Brody” Sentenced to 5 Years for $1M Investment Scam
A Miami man who fleeced victims out of nearly $1 million in a fraudulent cryptocurrency investment scheme has been sentenced to over 5 years in federal prison. [more…]
Scroll Launches zkEVM Mainnet
On October 17, 2023, Scroll, an open-source, community-centric Ethereum scaling solution, unveiled its mainnet, marking a pivotal stride towards augmenting scalability and propelling developer adoption on the [more…]
GNN-Based Pre-Silicon Power Side-Channel Analysis Framework At RTL Level
A technical paper titled “SCAR: Power Side-Channel Analysis at RTL-Level” was published by researchers at University of Texas at Dallas, Technology Innovation Institute and University of Illinois [more…]
DeFi Faces Intense Scrutiny in Europe Amid New Exploit
An EU financial markets authority has alerted investors to the severe risks of DeFi amid a new flash loan exploit on the Avalanche network. Over $2 million [more…]
A Framework To Detect Capacitance-Based Analog Hardware Trojans And Mitigate The Effects
A technical paper titled “DeMiST: Detection and Mitigation of Stealthy Analog Hardware Trojans” was published by researchers at Tennessee Tech University and Technische Universitat Wien. Abstract: “The [more…]
Novel NVM Devices and Applications (UC Berkeley)
A dissertation titled “Novel Non-Volatile Memory Devices and Applications” was submitted by a researcher at University of California Berkeley. Abstract Excerpt “This dissertation focuses on novel non-volatile [more…]
Friend.tech Users Lose $385K in Ether to SIM-Swap Scammer
On October 5, 2023, a blockchain investigator by the name of ZachXBT stated that a single scammer had stolen 234 ETH, which is roughly comparable to $385,000, from [more…]
Securing Automotive Ethernet Connections With MACsec
Zonal architecture in automotive design has become common in recent years in response to the increasing complexity of in-vehicle electrical systems. Automotive Ethernet is used to connect [more…]
Using Deep Learning to Secure The CAN Bus From Advanced Intrusion Attacks
A technical paper titled “CANShield: Deep Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal-Level” was published by researchers at Virginia Tech and others. “As [more…]