Mender blog
NXP i.MX Processors in IoT Platforms - An Overview | Mender
A powerful and state of the art processor is the backbone of every IoT project. NXP’s i.MX family of processors offer efficient power and graphics processing, and have become the industry standard for embedded designs.
The i.MX 6 series are based on the ARM Cortex A9 solo, dual or quad cores (in some cases Cortex A7) and typically come with one or more Vivante GPUs. It is designed in CMOS 40 nm...
Read the articleEditorial response to BBC Click article on IoT Device Security
Last week, we read in a BBC Click article how security researchers were able to access two different home EV chargers and take control of them. They were able to switch the devices on and off, remove access from the owners and they were also able to successfully demonstrate how these vulnerabilities could be used to access the home network, potentially eavesdropping, via the chargers.
Rpi Com... Read the articleHow does an OTA Firmware Update work?
Firmware updates are necessary to ensure the performance of embedded devices and to remove the software bugs that could impair their performance. It is inefficient to have technicians perform updates locally on IoT devices, at scale in IoT projects it becomes too costly or even impossible to manage. To top it off, there are security concerns, that if IoT devices are not properly patched for vulner...
Read the articlePreviewing the Beagle V
Beagleboard.org has joined forces with Seeed and StarFive to launch the Beagle V . The Beagle V has the advantage of being a low cost board that allows developers to access RISC V capability which has tremendous advantages in industrial IoT applications. The strategic idea behind the partnership is to bring RISC V capability to a much broader open source audience. Beagle V boards have already b...
Read the articleWhat are the IoT security threats?
Implementing a system for provisioning OTA software updates is part of best practice in a strategy to deal with IoT security threats. The best way is to put in place a Zero trust architecture . OTA updates can be scheduled to deliver CVE updates automatically and to scale and to anticipate and patch vulnerabilities minimising the threat vectors. What are the threat types that need to be consider...
Read the article