Electronica 2014 may be the ‘smartest’ show yet!

As we prepare to head off to Munich, Germany for perhaps one of the ’smartest’ shows of the year, Electronica 2014 attendees are in for a treat! Over the next couple of days, we will be unveiling a number of new solutions to further enable smart, connected and secure devices for the ever-growing Internet of Things (IoT) — […]

Got AES? Got security?

Currently in wide use, AES is a great algorithm that has been implemented in a number of hardware and software systems. It has been carefully studied by legions of cryptanalysts, so it’s often assumed that a system which includes AES is secure. But that assumption isn’t always true – in this post, let’s explore three situations […]

Report: Cyber breaches put 18.5 million Californians’ data at risk

The recent string of major data breaches — including the likes of Target, Home Depot, P.F. Chang’s and Nieman Marcus — have spurred a 600% increase in the number of California residents’ records compromised by cyber criminals over the last year, the latest California Data Breach Report revealed. According to the study, a total of 167 breaches were […]

Secure your hardware, software and IoT devices

Evident by a recent infographic published by Forbes, it appears people are finally cognizant of the urgent need for security. It’s clearer than ever that hacking has become a real problem over the web and into electronic devices. With the emergence of the Internet of Things (IoT), we consistently find ourselves connecting these gadgets and gizmos to the web. As a result, security […]

U.S. agencies investigate medical devices for cyber flaws

According to a recent report from Reuters, the U.S. Department of Homeland Security is currently investigating nearly two dozen cases of suspected cybersecurity vulnerabilities in medical devices and hospital equipment that officials fear could be exploited by hackers. The vulnerable products include implantable heart implants and drug infusion pumps, thus leaving members of the Industrial Control Systems Cyber Emergency Response Team […]

ECDH key exchange is practical magic

What if you and I want to exchange encrypted messages? It seems like something that will increasingly be desired given all the NSA/Snowden revelations and all the other snooping shenanigans. The joke going around is that the motto of the NSA is really “Yes We Scan,” which sort of sums it up. Encryption is essentially […]

There’s good news about BadUSB

The good news about the recently-revealed BadUSB is that there actually is a cure: Atmel CryptoAuthentication. Hardware crypto engines were invented to protect software, firmware and hardware from exactly these types of attacks, among many others. These uber-tiny, ultra secure hardware devices can be easily and cost-effectively added to USB sticks (and other peripherals) by manufacturers, who are […]

ATM hackers have stolen millions with Tyupkin malware

A group of cyber criminals is using a piece of malware to steal millions in cash from ATMs around the world — without having to use a credit or debit card. Security firm Kaspersky Lab discovered the hack, which is enabled by entering a series of digits on the keypad, and currently affecting ATMs from a major manufacturer running Microsoft Windows […]

Video: Atmel showcases the WINC1500 wireless module at ARM TechCon

Back in September, Atmel expanded its leading SmartConnect wireless portfolio with four new turnkey system-on-chips (SoCs), including the WINC1500. The recently-unveiled WINC1500 is an IEEE 802.11b/g/n network controller optimized for battery-powered Internet of Things (IoT) applications. The WINC1500 is an ideal add-on to existing MCU solutions bringing Wi-Fi and network capabilities through UART or SPI-to-WiFi interface, and connects to any Atmel […]

Security researchers release BadUSB attack code

Back in August during this year’s Black Hat Conference, Security Research Labs researchers Karsten Nohl and Jakob Lell warned of a serious flaw in USB devices that they dubbed “BadUSB.” As the duo revealed, the flaw can be abused by hackers to reprogram essentially any USB to wreak havoc as it impersonates other devices. Now a few months later, a pair […]