Your Security Partner

Can the Consumer Join in the Battle to Prevent Counterfeits Using NFC?

Consumers search online for authentic products at the very best prices. Unfortunately, they have no way to tell if they are purchasing a knockoff. …

Continue reading full post

Side Channel Attacks

In cryptography, a side channel attack accesses information about a secured system through the analysis of physical attributes of the system. This is in …

Continue reading full post

A Lesson from Recent Security Breaches: Default Settings

Technology can make life simpler and easier. But you need to know how to use it properly; otherwise, the potential dangers technology can pose are real …

Continue reading full post

Cryptography in Transition: Leaving Behind Human Oversight

Cryptography has primarily existed to send secret messages, often political or military, between people. For the political case I'm reminded of the …

Continue reading full post

Alibaba Group Sued Again Over Alleged Counterfeits

Despite efforts to combat counterfeits, Alibaba ecommerce websites reportedly “encourage, assist” fake merchandise.

Continue reading full post

About this Blog

The TrustPoint Innovation Blog covers security industry topics relating to Certificates, Elliptic Curve Cryptography (ECC), Machine-to-Machine (M2M) Communication, Near Field Communication (NFC), Vehicle-to-Vehicle (V2V) Communication, and more.

Categories