Latest from Embedded

William Wong/Endeavor Business Media
promo__vita_93_qmc__william_wong
ID 316508515 © Alena Butusava - Dreamstime.com
Brainchip Platform Uses Spiking Neural Networks for Low Power Operations
Dreamstime_Eugenesergeev_215838205
dreamstime_eugenesergeev_215838205
76795646 © Cybrain | Dreamstime.com
promo_cybrain_dreamstime_xxl_76795646
Electronicdesign Com Sites Electronicdesign com Files Fig 1 Lobby Aquarium

What You Need to Know About SHA-3 for Embedded System Security (.PDF Download)

May 20, 2019
What You Need to Know About SHA-3 for Embedded System Security (.PDF)

On the surface, this sounds ridiculous: A lobby fish tank gets attacked by hackers. Why would anyone want to break into a fish tank (Fig. 1)? But in this case, the aftermath was serious. The fish tank was inside a casino and its temperature and lighting were controlled by an internet-connected system. The break-in provided the hackers with an entryway into the casino’s network—and its sensitive database containing information about high-roller clients.

1. What are the odds that this lobby aquarium could get hacked? It’s fair game if it has an IoT component and is unsecured.