Researchers Sean Cross and Dr. Andrew Huang demonstrated yesterday at the Chaos Communication Congress that they could write arbitrary code onto various flash-based SD memory cards. Researchers ...
We hope that some of our readers are currently at this year’s Chaos Communication Congress (schedule can be found here and live streams here), as many interesting talks are happening. One of them ...
Logging data from a large number of monitored channels usually requires a lot of memory for storing the measured data. Unfortunately, smaller microcontrollers offer only limited amounts of internal ...
About a year ago, Intel announced they’d be launching a new platform stuffed into an SD card. Imagine – an entire computer packaged into an SD card, with nine whole pins for power and I/O. Cooler ...
Putting malicious code on USB thumb drives and dropping them near employee entrances is an old hack. A curious employee plugs the USB drive into their PC and voila, another hacked computer. At the ...
We used to need SBCs for these projects; modern microcontrollers handle them more easily and inexpensively while being easier ...
Sharing SD cards might soon be as risky as sharing USB drives. You can hack those small memory chips to perform man-in-the-middle attacks, as shown off by two researchers, Bunnie and xobs, at 30C3 ...
PARIS – The Californian developer and manufacturer of advanced semiconductor solutions Atmel Corp. announced Tuesday (January 9) it has delivered volume quantities of its secure microcontroller for ...
SD and Micro SD flash memory cards have become ubiquitous in consumer and industrial devices, but lurking behind these familiar facades is a plethora of interfaces ranging from a single data bit ...
Which SD memory card is best? SD memory cards are widely used today, and while they may all look the same, there are some key differences to note to ensure they’re compatible with your hardware. Still ...
The use of RFID and contactless smart card technology is exploding and devices (e.g. tags, tokens, cards) all require embedded memory arrays that suit the needs of the application. All of these ...