What is Ambient Security?

New technology and business buzzwords pop up constantly. Hardly a day goes by that you don’t see or hear words such as “cloud”, “IoT,” or “big data.” Let’s add one more to the list: “Ambient security.” You’ll notice that big data, the cloud, and the IoT are all connected, literally and figuratively, and that is the point. […]

FBI warns that ‘destructive’ malware attacks could hit the U.S.

In the wake of the recent Sony Pictures hack, the FBI has issued a confidential report urging businesses to remain vigilant against new malicious software that can be used to launch “destructive” cyberattacks. According to Reuters, the five-page confidential warning doesn’t specifically list the Sony incident. It does, however, name an attack that cybersecurity experts tell the news agency is a large-scale hack […]

Getting up close and personal with symmetric session key exchange

In today’s world, the three pillars of security are confidentiality, integrity (of the data), and authentication (i.e. “C.I.A.”). Fortunately, Atmel CryptoAuthentication crypto engines with secure key storage can be used in systems to provide all three of these. Focusing on the confidentiality pillar, in a symmetric system it is advantageous to have the encryption and decryption key shared on […]

Atmel and IoT and Crypto, oh my!

One of the companies that is best positioned to supply components into the Internet of Things (IoT) market is Atmel. For the time being most designs will be done using standard components, not doing massive integration on an SoC targeted at a specific market. The biggest issue in the early stage of market development will […]

SAM G family and Arduino Wi-Fi Shield 101 among EDN’s Hot 100 Products of 2014

Another year, another couple of spots on EDN’s Hot 100 Products list! Just announced, the industry publication has chosen both the newly-unveiled Arduino Wi-Fi Shield 101 and the Atmel | SMART SAM G family among this 2014’s hottest boards and development tools helping to enable key trends like the Internet of Things, wearables and security, as well emerging technologies such as 3D printing and wireless power. “Of […]

Don’t be an “ID-IoT”

Authentication may just be the “sine qua non” of the Internet of Things.  Let’s just come out and say it: Not using the most robust security to protect your digital ID, passwords, secret keys and other important items is a really, really bad idea. That is particularly true with the coming explosion of the Internet of Things (IoT). The […]

Introducing the SmartConnect SAM W25 module for edge nodes IoT applications

Now on display at Electronica 2014, the SmartConnect SAM W25 module is the industry’s first fully-integrated FCC-certified Wi-Fi module with a standalone MCU and hardware security from a single source. The module includes Atmel’s recently-announced 2.4GHz IEEE 802.11 b/g/n Wi-Fi WINC1500, along with an Atmel | SMART SAM D21 ARM Cortex M0+-based MCU and Atmel’s ATECC108A optimized CryptoAuthentication […]

Day 1: Atmel @ Electronica 2014

Day 1 of Electronica 2014 in Munich, Germany has drawn to a successful close. Surely enough, it didn’t take long before the Atmel booth — located in Hall A5, #542 — was jam-packed, hosting countless engineers, designers, partners and industry insiders throughout an exciting nine hours. While at the booth, visitors had the opportunity to check out a plethora of […]

Atmel launches G3-PLC-compliant power-line carrier solutions

During European Utility Week 2014, Atmel will be debuting a pair of new power-line communication solutions compliant with the G3-PLC specification. The new Atmel G3-PLC products include the SAM4CP16C system-on-chip (SoC) and ATPL250A modem that are pin-compatible with PRIME-compliant members of the Atmel | SMART portfolio of energy metering solutions already in production. The SoC option is […]

Video: Vegard Wollan addresses Internet of Things security

In this video segment from my interview with Vegard Wollan, the co-inventor of the AVR microcontroller, we explore in detail the security problems you need to address as an embedded designer. Let’s face it, it is obvious that security is a way of thinking. You have to assume bad people are going to try and hack your products. […]