Latest from Embedded

Dreamstime_Monsit-Jangariyawong_117103442
dreamstime_monsitjangariyawong_117103442
Tony Vitolo/Electronic Design
promo1920x1080
ID 83317721 © Igor Zakharevich | Dreamstime.com
supplychain_dreamstime_l_83317721
ID 144516710 © vladimir timofeev | Dreamstime.com
Data Center
ID 5549870 © Artistar | Dreamstime.com
hard_drive_dreamstime_l_5549870
ID 144516710 © vladimir timofeev | Dreamstime.com
Data Center
Electronicdesign Com Sites Electronicdesign com Files Fig 1 Lobby Aquarium

What You Need to Know About SHA-3 for Embedded System Security (.PDF Download)

May 20, 2019
What You Need to Know About SHA-3 for Embedded System Security (.PDF)

On the surface, this sounds ridiculous: A lobby fish tank gets attacked by hackers. Why would anyone want to break into a fish tank (Fig. 1)? But in this case, the aftermath was serious. The fish tank was inside a casino and its temperature and lighting were controlled by an internet-connected system. The break-in provided the hackers with an entryway into the casino’s network—and its sensitive database containing information about high-roller clients.

1. What are the odds that this lobby aquarium could get hacked? It’s fair game if it has an IoT component and is unsecured.