By Christine Young, Blogger, Maxim Integrated



From Yahoo and LinkedIn to the Internal Revenue Service, the Democratic National Committee, and everyday objects like dolls and DVRs, it seems that almost nothing is safe from hacking. Indeed, as more of our everyday things get smarter and connected, they can also become open to attack.


As an example, look no further than last fall’s distributed denial-of-service (DDoS) attack that brought down popular websites such as Amazon, Netflix, Reddit, and Spotify. This large-scale internet outage was caused by the Mirai botnet, which hacked into CCTV video cameras and DVRs. Indeed, DDoS attacks are on Wired’s list of the biggest security threats for this year, along with ransomware, weaponized consumer drones, and another iPhone encryption clash.


In May 2000, the FBI opened its Internet Crime Complaint Center (IC3). The bureau’s most recent cybercrime report, its 2015 Internet Crime Report, reports that IC3 has amassed more than 3.4 million complaints since the center was formed. In 2015 alone, according to the report, there were more than 288,000 complaints amounting to more than $1 billion in reported losses. As RSA notes in its white paper, “2016: Current State of Cybercrime:” “From mobile threats and ransomware to the role of biometrics in reducing fraud, a myriad of threats exist across the cyber landscape and the commoditization of cybercrime is making it easier and cheaper to launch attacks on a global scale.”


Too many businesses consider security to be expensive, time-consuming, and/or complex to implement. Truth be told, there are techniques and technologies that you can tap into to integrate robust security into your design in an efficient and affordable manner. The fact to keep in mind is, a breach can turn out to be far more costly in terms of lost revenue as well as damage to brand reputation and customer loyalty.


White Paper: Essential Design Security Technology

Maxim has a new white paper, “Why Hardware-Based Design Security is Essential for Every Application,” that corrects the misconceptions around implementing design security. Read the paper to better understand why hardware-based security presents a much more robust option than a software-based approach. Learn about cost-effective embedded security technologies that simplify the process of designing in security. Read the white paper today and protect your next design against threats such as hacking, counterfeiting, and more.