Mender blog

Showing posts tagged: IOT & OTA x

NXP i.MX Processors in IoT Platforms - An Overview | Mender

18th Aug 2021

A powerful and state of the art processor is the backbone of every IoT project. NXP’s i.MX family of processors offer efficient power and graphics processing, and have become the industry standard for embedded designs.

The i.MX 6 series are based on the ARM Cortex A9 solo, dual or quad cores (in some cases Cortex A7) and typically come with one or more Vivante GPUs. It is designed in CMOS 40 nm...

Read the article

Editorial response to BBC Click article on IoT Device Security

9th Aug 2021

Last week, we read in a BBC Click article how security researchers were able to access two different home EV chargers and take control of them. They were able to switch the devices on and off, remove access from the owners and they were also able to successfully demonstrate how these vulnerabilities could be used to access the home network, potentially eavesdropping, via the chargers.

Rpi Com... Read the article

How does an OTA Firmware Update work?

28th Jul 2021

Firmware updates are necessary to ensure the performance of embedded devices and to remove the software bugs that could impair their performance. It is inefficient to have technicians perform updates locally on IoT devices, at scale in IoT projects it becomes too costly or even impossible to manage. To top it off, there are security concerns, that if IoT devices are not properly patched for vulner...

Read the article

Previewing the Beagle V

19th Jul 2021

Beagleboard.org has joined forces with Seeed and StarFive to launch the Beagle V . The Beagle V has the advantage of being a low cost board that allows developers to access RISC V capability which has tremendous advantages in industrial IoT applications. The strategic idea behind the partnership is to bring RISC V capability to a much broader open source audience. Beagle V boards have already b...

Read the article

What are the IoT security threats?

13th Jul 2021

Implementing a system for provisioning OTA software updates is part of best practice in a strategy to deal with IoT security threats. The best way is to put in place a Zero trust architecture . OTA updates can be scheduled to deliver CVE updates automatically and to scale and to anticipate and patch vulnerabilities minimising the threat vectors. What are the threat types that need to be consider...

Read the article