New Horizons for Chip Design

Archive for the 'Malware' Category

 

Counterfeit Chips 101: Protect Your Next Design

We explain the world of counterfeit chips, including types of fake chips, chip design techniques to prevent counterfeiting, and the global forces at play.

Continue Reading...

Posted in Malware, Security, Verification

 

Casino’s Aquarium Leaks High Rollers’ Personal Data

It might have been a deleted scene from one of the Ocean’s Eleven movies. Data thieves hack into a major casino. They attack not through the main but a secondary network and, once inside, bootstrap their way into other parts of the casino network until they get lucky and find a cache of sensitive data that they proceed to steal.

Continue Reading...

Posted in Internet of Things, Malware

 

Harnessing the Power of Women in Tech: a USA Today Feature

Women play vital roles in developing the tools that engineers around the world use to design smart chips and develop secure code for the amazing devices that are changing the way we work and play. USA Today recently featured three Synopsys engineers, who reflect on their experiences as women in tech and offer advice on carving out success in a male-dominated field.

Continue Reading...

Posted in Application Security, Artificial Intelligence, Automotive, Cryptography, EDA, Healthcare, Internet of Things, IP, Machine Learning, Malware, Optical Design, Privacy, Quantum Computing, Robotics, Security, Superconducting Electronics, TCAD

 

Mirai IoT Botnet Co-Creators Plead Guilty

For their involvement in creating and distributing the Mirai IoT-based botnet, Paras Jha, Josiah White, and Dalton Norman each admitted on Wednesday to one count of conspiracy in plea agreement in Alaska. A botnet is traditionally defined as a network of compromised computers that can be remotely controlled to mount large-scale attacks such as a distributed denial-of-service (DDoS) attack on a website. Mirai was the first botnet to compromise and remotely control internet of things (IoT) devices in a large-scale attack on internet services.

Continue Reading...

Posted in Internet of Things, Malware, Security

 

White House Updates U.S. Zero Day Software Vulnerability Policy

Zero days are simply software vulnerabilities for which there is no public patch or workaround. They have value because they can allow remote code exploitation or electronic surveillance without detection for long periods of time. On Wednesday, White House Cybersecurity Coordinator, Rob Joyce, issued updated guidance how the U.S. handles zero days.

Continue Reading...

Posted in Malware, Security

 

Recent Ransomware Attacks Produce Tangible Financial (and Possibly Human) Costs

In recent financial reports, some global organizations are now reporting losses averaging $300 million USD as the result of malicious software first spread in early 2017.

Continue Reading...

Posted in Malware