News

Trusted computing: Will it work? An initiative by technology giants to add security hardware to the PC has cryptographers worried but security companies slavering.
New group will develop and implement a set of specifications for trusted computing platforms.
However, the Trusted Computing Base (TCB) code that mobile apps depend upon is very complex: popular mobile platforms based on iOS, Android, or Windows 8 comprise a full blown OS, local services, and ...
Opinion: Trusted computing initiatives are just sheep in security clothing.
Another way to think about this is the Trusted Computing Base (TCB), which is all the system components critical to establishing and maintaining the security of the system.
The Trusted Computing Group (TCG) has a lofty goal -- to give the IT industry a base on which to develop systems that are less prone to attacks and malicious access. The nonprofit industry ...
The Trusted Platform Module (TPM) 2.0 specification is affected by two buffer overflow vulnerabilities that could allow attackers to access or overwrite sensitive data, such as cryptographic keys.
BedRock Systems and DESE Research, Inc. have developed a trusted computing base integration framework (TCBIF) that supports flexible design and secure integration of multiple features, functions ...
SiFive, Inc., the pioneer and leader of RISC-V computing, today announced the company is giving the WorldGuard security model to RISC-V International, ...
New Zealand's lead state-sector authority has drawn a line in the sand to ensure government information security is not compromised by new "trusted computing" and digital rights management (DRM ...
Microsoft Chairman and Chief Software Architect Bill Gates Tuesday unveiled new PC security technology aimed at ensuring privacy protection and opening the door to a new class of PC applications.