Choosing Microcontroller

Selecting the right microcontroller for a product or Project can be a daunting task. Not only are there a number of technical features to consider, there are also business case issues such as cost and lead-times that can cripple a project. At the start of a project...

New Vulnerability in Windows Devices

New Microsoft Secure Boot Policies Create a Vulnerability in Windows Devices It’s True — There is no such backdoor that only its creator can access. Microsoft has accidentally leaked the Secret keys that allow hackers to unlock devices protected by UEFI (Unified...

Google Android Hardening Checklist

The hardening checklists are based on the comprehensive checklists produced by CIS. The Information Security Office has distilled the CIS benchmark down to the most critical steps for your devices, with a particular focus on configuration issues that are unique to the...