Your Security Partner

LoRaWAN Security Overview

LoRa Logo

Low Power Wide Area Networks (LPWANs) are emerging to address Internet of Things applications where devices are distributed over a wide area. Think …

Continue reading full post

A Novel Approach to Key Sharing – Connect With the Facts V2

Car Door Handle

As keyless entry systems become ubiquitous, concerns about security are growing and gaining attention. Key sharing is one area that continues to present unique and significant challenges for car owners and manufacturers alike. …

Continue reading full post

October Round Up of News That Proves Trust Is the Point

Blue Lock

October IoT Roundup: DDoS Predictions Fulfilled, We Look to Medical Devices Next …

Continue reading full post

Security of Internet-Connected Hearing Aids

Two older men walk in a park with focus on one man's head

Hearing Aid technology has evolved tremendously in the last 20 years. I bought my first hearing aids in 1996, and …

Continue reading full post

Is Your Device Participating in a DDoS Attack?

Soldiers Marching

The Internet of Things is poised to become an enormous $11 trillion-dollar industry, if it doesn't become a liability for enterprises and …

Continue reading full post

September Round Up of News That Proves Trust Is the Point

Blue Lock

Speaking at the Security of Things forum in Cambridge, Robert Silvers of Homeland Security made a strong case for securing ourselves now instead of …

Continue reading full post

Build trust in from the start with Professional Services from TrustPoint Innovation

Design in Trust

At TrustPoint Innovation Technologies, We Know Security. …

Continue reading full post

V2V Security Myths Debunked

Google's self driving car driving between orange cones on a test course.

Would you feel comfortable riding in a driverless car? Groups that identify as The New America Foundation and Public Knowledge requested an emergency …

Continue reading full post

August Round Up of News That Proves Trust Is the Point

Blue Lock

DEF CON held its 24th convention this August, highlighting the ever-growing cost of implementing security as an afterthought—and new executive survey data shows that security is becoming the number-one technological priority for businesses. …

Continue reading full post

A Student of the IoT

IoT Project

This summer I have been lucky enough to work for TrustPoint Innovation as a co-op student. Since I am a math and computer science student at the University of Waterloo, with an interest in cryptography and information security, I couldn't have asked for a better opportunity. …

Continue reading full post

The Volkswagen Key: Highlighting the Need for a Faster Response

Volkswagen Key

Would you buy a house that anyone could access for $40? Volkswagen owners weren't given the chance to consider this question when they bought their cars over the last two decades, according to Wired. …

Continue reading full post

July Round Up of News that Proves Trust is the Point

Blue Lock

It seems that many people have a blind faith when it comes to their devices. What will it take to get people to take IoT security seriously? …

Continue reading full post

Security and Smart Cities

Smart City

Now that the term Internet of Things has taken root in our everyday vocabulary, Smart Cities is the next concept that's bound to get a lot of attention. …

Continue reading full post

June Round Up of News that Proves Trust is the Point

Blue Lock

Whether we purchase devices on our own or just venture out into the world, the Internet of Things will have an impact on our lives. In many ways, these devices will improve how we run our cities …

Continue reading full post

Making the Right Choice: Security and NFC/RFID Tags

Four Locks

Depending on the application, NFC/RFID tags may or may not require some level of security. If you were only interested in tracking assets, a simple serial number …

Continue reading full post

TrustPoint Innovation at Premier Automotive Events This June

Who says the summer months are quiet? This June, there's a lot of action in the automotive world, and TrustPoint Innovation is in the center of it all. …

Continue reading full post

May Round Up of News that Proves Trust is the Point

Blue Lock

The Internet of Things is expected to grow dramatically in just a few short years. According to a recent report by Gartner Group, we can expect to see 21 billion connected devices by 2020. The market value …

Continue reading full post

The Future of Connected Cars: Planning for 260 Billion Certificates per Year

V2V and V2I Communication

Earlier this month, TrustPoint Innovation presented at ITS Canada's 2016 conference. We provided an update on the Security Credential Management System (SCMS), the security infrastructure that powers the US Department of Transportation's …

Continue reading full post

April Round Up of News that Proves Trust Is The Point

Blue Lock

IoT security issues are becoming more and more common. Every new survey seems to reveal that consumers are wary about the connected …

Continue reading full post

Taking Self-Driving Cars One Step at a Time

If you haven't seen the YouTube video of the 70-year-old woman behind the wheel of a self-driving Tesla, take a look. She's clearly not ready for …

Continue reading full post

Petition to Support NFC on iPhone

NFC is a great technology. It allows us to easily access and share information. Its functionality is perfect for our smartphone-connected world. At …

Continue reading full post

March Round Up of News that Proves Trust Is The Point

Blue Lock

The issues with IoT security are so widespread that most articles that focus on how the Internet of Things will change our lives also give attention …

Continue reading full post

Smartphones as Keys: Are They Secure?

Car Door Handle

A couple of months ago, Volvo unveiled their new keyless entry system at MWC 2016. Like many other manufacturers, Volvo is looking at taking advantage …

Continue reading full post

Keeping the Back Door Locked

February Round Up of News that Proves Trust Is The Point

I Spy

The promise of a connected world offers so many opportunities to make life easier. However, developers need to get their act together when it comes to …

Continue reading full post

Time to Upgrade from SHA-1

Bad TLS

A potential client clicks on a link to your website. They get a warning that your security certificate may not be reliable. What would that do to the …

Continue reading full post

News that Proves Trust is the Point

IoT is making a lot of waves — with promises of more and more connected devices coming out over the next 10 years. With the number of stories …

Continue reading full post

CES was buzzing with IoT. What about security?

CES

Another CES is in the books. As usual, the booths were crammed with exciting innovation. It's been fascinating to watch the evolution of CES over the …

Continue reading full post

Trust and IoT Devices

Growing Number of Connected Devices

Connected devices are now a part of everyday life. While not everyone may fully understand the exact definition of "the Internet of Things", the term …

Continue reading full post

Security: An Essential Part of Automotive Product Development

The NAIAS in Detroit, Michigan is the largest car show in the world. Just a month away, the show promises to unveil the latest models and the newest …

Continue reading full post

Raising Awareness One Hack at a Time

Devices that connect to the Internet are susceptible to hacking. The latest security breach came out this week as VTech confirmed that the data of …

Continue reading full post

Opening Doors With NFC and ECC

We use doors every day to gain access to our homes, cars and offices. While lock and key mechanisms have evolved significantly, a certain lack of …

Continue reading full post

Consumers Need to Take Charge to Demand Better Security

After surviving a harrowing experience at the wheel of a hacked vehicle, WIRED journalist Andy Greenberg shared his insight in to what can be …

Continue reading full post

A Behind the Scenes Look at How the TrustPoint Innovation Team Keeps our Tech Secure

Elliptic Curve Cryptography

Near Field Communication, Internet of Things and Vehicle-to-Vehicle — these are all emerging technologies that promise to improve our lives. Without …

Continue reading full post

Ontario is the First Province to Welcome Driverless Car Testing

Google Driverless Car

Ontario is the first province in Canada to remove restrictions that will allow for testing driverless vehicles on provincial roads and highways …

Continue reading full post

Self-Driving Cars and “Learning” Computers: Securing the Future of Transportation

So often when we discuss the Internet of Things, automated machines, and integrating the Internet into every facet of our everyday lives, we focus …

Continue reading full post

Should Consumers Care About Counterfeit Goods?

We know manufacturers care about counterfeits. High quality counterfeits compete directly with the genuine article leading to lost sales. Low …

Continue reading full post

IoT Security in the Home

As more and more household products are developed with Internet integration in mind, the shift towards an all-connected “Internet of Things” …

Continue reading full post

IBM Seals Deal With ARM Holdings

In another major shift for IoT development, news broke recently that IBM has signed a deal with ARM Holdings, a British company that designs …

Continue reading full post

Automobile Hacking: Should You Be Concerned?

If you've bought a car manufactured in the past few years, chances are high that it will utilize between 20 and 70 computers, all with their own …

Continue reading full post

IC3 Releases Warning on IoT Security

The IC3 (Internet Crime Complaint Center), a division of the FBI, released a public service announcement on September 11, 2015, regarding …

Continue reading full post

Can the Internet of Things Grow Without Trust?

How much information are we giving away?

The Internet of Things. Five years ago very few people had heard of the concept. Despite the fact that the term is now commonly used …

Continue reading full post

My Experience at the Canadian Connected Car Technology Roadshow

From June 15–19, 2015, sixteen connected-car companies from Canada travelled to Silicon Valley near San Francisco to meet with the top automotive …

Continue reading full post

Taylor Swift: Shaking Off Counterfeits in China

Taylor Swift has long held a passionate stance on the protection of intellectual property in the music industry, and is not afraid to stand up for …

Continue reading full post

Privacy and IoT Security

As our world becomes more entwined with the internet, we risk laying bare our personal lives for the world. This isn't some futuristic fear either; we …

Continue reading full post

Your Worst Driving Nightmare: Security Flaws in New Vehicles Now Top Priority

Driving down a highway in your new vehicle, there would be nothing more terrifying than to cross paths with a careless driver or unavoidable obstacle …

Continue reading full post

How is NFC Revolutionizing Advertising Campaigns?

The options for using NFC tags in advertising are endless. NFC (or near field communication) is a wireless technology that facilitates fast and efficient …

Continue reading full post

Government Officials and Device Security

Government officials need their electronic devices to be secure. Blackberry security has recently come under scrutiny from Shafiq Qaadri, a Liberal MPP

Continue reading full post

How Smart Cars Will Make Roads Safer

According to the United States Department of Transportation's National Center for Statistics and Analysis, 2.4 million vehicle-related injuries occurred …

Continue reading full post

Health Care Privacy in the World of IoT

What if your most intimate secrets were exposed to the world? The possibility of health care privacy breaches in the new era of the Internet of Things …

Continue reading full post

IoT Security and Government Agencies

Are government agencies keeping up with technological advancements? The expansion of the Internet of Things (IoT) has created numerous possibilities for …

Continue reading full post

Can the Consumer Join in the Battle to Prevent Counterfeits Using NFC?

Consumers search online for authentic products at the very best prices. Unfortunately, they have no way to tell if they are purchasing a knockoff. …

Continue reading full post

Side Channel Attacks

In cryptography, a side channel attack accesses information about a secured system through the analysis of physical attributes of the system. This is in …

Continue reading full post

A Lesson from Recent Security Breaches: Default Settings

Technology can make life simpler and easier. But you need to know how to use it properly; otherwise, the potential dangers technology can pose are real …

Continue reading full post

Cryptography in Transition: Leaving Behind Human Oversight

Cryptography has primarily existed to send secret messages, often political or military, between people. For the political case I'm reminded of the …

Continue reading full post

IKEA and the Connected Kitchen

IKEA has a newfound set of ideas for their version of the Kitchen of 2025. They call this vision the “Concept Kitchen”, and have recently shared their …

Continue reading full post

The Internet of Things: How Secure is it?

The Internet of Things is here to stay. There will only be more devices, not less, that are connecting to your network in the future. Unfortunately, the …

Continue reading full post

Implicit Certificates in V2V

There has been a lot of news recently about vehicle-to-vehicle or “V2V” technology and how it is being adopted by the U.S. Department of Transportation …

Continue reading full post

Canadian technology to be used to provide the security for V2V Communications for Crash Avoidance

In mid-July of this year, President Obama was speaking at a federal highway research facility in Northern Virginia about the development and testing of …

Continue reading full post

NFC Security Part 1: NFC Tag Reader/Writer

NFC security is highly dependant on the targeted application and mode of operation. This post explores the three modes of NFC: Tag Reader/Writer, Card …

Continue reading full post

What is the purpose of NFC NDEF Signature Records?

This question was posted a few years ago by Eric Vétillard in this blog post.

Continue reading full post

Setting the Record Straight on ECC

Recent articles appearing in The New York Times, Der Speigel, Canada's The Globe and Mail, Britain's The Guardian and a host of other media have …

Continue reading full post

Digital Certificates

A digital certificate is an electronic credential used to verify and authenticate the identity of an individual or device. Its primary function is to …

Continue reading full post

M2M Security

TrustPoint Innovation is bringing to the market a solution specifically designed to provide users and devices connected to M2M end points the ability to securely …

Continue reading full post

About this Blog

The TrustPoint Innovation Blog covers security industry topics relating to Certificates, Elliptic Curve Cryptography (ECC), Machine-to-Machine (M2M) Communication, Near Field Communication (NFC), Vehicle-to-Vehicle (V2V) Communication, and more.

More Categories