Remember the movie The Imitation Game? The film depicts Alan Turing and his team at Bletchley Park trying to crack the Enigma machine and decrypt German intelligence codes for the British government during World War II. While modern cryptography relies on complex algorithms and asymmetric key encryption to keep data secure, prior to the 1970s cryptanalysis was mostly a manual process used for military purposes.
Women play vital roles in developing the tools that engineers around the world use to design smart chips and develop secure code for the amazing devices that are changing the way we work and play. USA Today recently featured three Synopsys engineers, who reflect on their experiences as women in tech and offer advice on carving out success in a male-dominated field.
When security researchers first demonstrated that they could hack a car over the internet to control its brakes and transmission, Chrysler had to recall 1.4 million vehicles to fix the software vulnerability. The infamous Jeep hack of 2015 was an expensive wake-up call for the automotive industry. So, what has changed since then?
By 2020 more than 50 billion devices will be connected to the internet ― according to Cisco’s latest forecast. Smartphone traffic will exceed PC traffic and broadband speeds will nearly double by 2021. And by the next Winter Olympics (Beijing 2022), 1 trillion networked sensors could be embedded in the world around us. While tech experts offer slightly different projections of actual numbers, it’s clear that the Internet of Things (IoT) will grow exponentially. And this explosion means new opportunities for one-time programmable (OTP) non-volatile memory (NVM).
A few weeks ago, the fitness company Strava published a worldwide heatmap showing specific routes their customers have taken over the years. While it is a visual heatmap of human activity on the planet, according to various security researchers the heatmap also exposed private areas such as routes within top secret military bases. This is not a conventional data breach where sensitive data was exposed through a specific vulnerability in the software or device. In this case the device and software operated as designed. Rather, the flaw appears to be in how the end-user has configured their device in terms of collection and sharing, and that’s a flaw all too common in the Internet of Things (IoT) today.
So far, connected autonomous vehicles have been tested in urban settings. That may be part of a larger business model that suggests on-demand driverless vehicles may soon dominate urban areas. It may also reflect a much harsher reality: While there’s plentiful internet within urban centers, there’s less so everywhere else.
Using previously studied data from NASA’s Kepler Space Telescope, a Google machine learning algorithm discovered two new planets orbiting a nearby star already known to have six planets. At a total of eight planets, that system matches our own solar system. It also begs a question: How many other planetary systems might be hiding in previously analyzed data?
For their involvement in creating and distributing the Mirai IoT-based botnet, Paras Jha, Josiah White, and Dalton Norman each admitted on Wednesday to one count of conspiracy in plea agreement in Alaska. A botnet is traditionally defined as a network of compromised computers that can be remotely controlled to mount large-scale attacks such as a distributed denial-of-service (DDoS) attack on a website. Mirai was the first botnet to compromise and remotely control internet of things (IoT) devices in a large-scale attack on internet services.
Two new surveys from Synopsys find there is general alignment among C-level IT professionals, managers, and executives in Europe and in Asia in terms of application security concerns and mitigations. Although the percentages differ by region, the order in which concerns and solutions ranked generally agreed.
Despite years of evidence from researchers that some medical devices in homes and in healthcare facilities may contain serious vulnerabilities, such has the ability to manipulate insulin pumps and pacemakers wirelessly, there has been little acknowledgement from the industry. Unlike the automotive industry, which addressed a wide variety of cybersecurity issues soon after the infamous Cherokee Jeep Hack in the summer of 2015, medical devices have remained rife with potentially life-threatening vulnerabilities. That is about to change.
Melissa Kirschner is Web Editor-in-Chief at Synopsys. She has been a writer, editor, and content strategist in high-tech for more than 15 years. Melissa is fascinated by the socio-cultural implications of the digital age. When not researching AI, autonomous driving, 5G, cryptography, and medical advancements, she enjoys reading the works of Neil Gaiman, watching dystopian dramas, and rescuing abused animals. Most of all, she likes to write things that people like to read.