Understanding the Dangers Posed by Generative AI Phishing
Malicious actors are leveraging the power of Generative AI, meaning cybersecurity professionals must use AI to shield against attacks.
Read Blog
Malicious actors are leveraging the power of Generative AI, meaning cybersecurity professionals must use AI to shield against attacks.
Read Blog
The Channel Sounding technology added to Bluetooth 6.0 opens a huge range of possible distance ranging and locationing applications.
Read Blog
Engineers are implementing changes to the IoT to make it more resilient by ensuring that problems are isolated to prevent widespread failure.
Read Blog
Chip makers are enhancing IoT security with MCU hardware features, giving developers new techniques to harden their products against malicious attacks.
Read Blog
Since quantum computers will easily break current cryptography keys, engineers are developing PQC algorithms that tomorrow’s computers can’t break.
Read Blog
Encryption protects data from hackers, unless they gain the cryptographic key. Hardware security modules ensure keys remain secure.
Read Blog
Matter offers seamless connectivity between smart-home products from different vendors while enabling developers to design more innovative, secure solutions.
Read Article
Smart manufacturing helps to build things right the first time, saving money and resources. (Source: panuwat - stock.adobe.com) Back in the 70s, “Industry 3.0” was the name for the paradigm...
Read Blog
With Matter, smart-home devices will work well together and the true potential of connected tech will be realized. (Source: AndSus - stock.adobe.com) The dream of the smart home—an automated...
Read Blog
(Source: Елена Бутусова – adobestock) The Arm® Cortex®-M33 processor is a popular choice for wireless systems designers looking to wring out every last microwatt from the constrained power budget...
Read Blog
5G will not only boost mobile telecom but also the IoT with technology such as DECT-2020 NR. (Source: THANANIT - stock.adobe.com) Mobile communications has followed a development path signposted...
Read Blog
(Source: Nana_studio/Shutterstock.com) The Bluetooth® Special Interest Group (SIG) identified audio as a key market for Bluetooth wireless technology virtually from its adoption. Soon after...
Read Blog
Why Cellular IoT Needs eSIM Adoption But Might Not Get It (Source: Panuwatccn /Shutterstock.com) Low power wide area networks (LPWANs) are being rolled out to link, for example, Bluetooth® Low...
Read Blog
Switching voltage regulators are a popular solution when long battery life is required as they have a reputation for high efficiency. But when closely
Read Article
The data carried across the IoT is valuable, and the unscrupulous will find and exploit any weakness to get hold of it. That makes protecting the tril
Read Article
The additional voltage and current introduced to the popular USB standard by USB-PD multiplies hazards and makes circuit protection essential. But des
Read Article
An upgrade to the Bluetooth Core Specification, Bluetooth 5.1, adds direction finding capabilities. The enhancement promises much for applications su
Read Article
Wi-Fi routers offer a cheap, convenient gateway to connect IoT sensors to the Cloud, but tests reveal the devices have weak security. As the IoT grows
Read Article
While smart-home devices are gaining traction, the truly connected home remains a dream. Engineers are working on interim solutions to meld disparate
Read Article
LEDs save energy, but efficient electric motors can save much more. Now a new generation of GaN transistors promises new power-supply breakthroughs to
Read Article
Loading More...