WiFi KRACK: Take these four key steps to manage the risk and protect your network

2018-10-09T12:52:45+00:00

When the WPA2 vulnerability, better known as the WiFi KRACK was revealed late last year, what followed was a torrent of concerning headlines suggesting that all WiFi communications could be decrypted. Whilst it is vulnerability at the core of one of the most popular forms of WiFi network security, all is not as bad as some of the articles might lead you to believe.   We're going to take a realistic look at how this attack works and outline some important steps users and service providers can take to keep networks and devices safe.   WiFi KRACK: Four key steps to manage the risk and protect your network   What is a KRACK?   KRACK, meaning Key Reinstallation AttaCK, works by abusing a flaw found in the WPA2 implementation declared [...]

WiFi KRACK: Take these four key steps to manage the risk and protect your network2018-10-09T12:52:45+00:00

Secure Boot on the iMX6 – Part 2

2018-10-09T10:35:09+00:00

With embedded systems security such a hot topic right now, we’re looking at the secure boot on the iMX6, one of electronics’ most popular processors. Part one was really an introduction to the secure boot process, examining it in detail. Here, in the second instalment of our 3-part series, we cover managing the hardware, the pitfalls of the secure boot process, and authentication.   Secure Boot – Leveraging the Hardware It’s a suite of hardware - you have secure storage, you have one-time storage, you have hardware-accelerated cryptography. Security algorithms can be hardware-accelerated which combine to make a speedy and secure boot process. Part of it is the one-time fuses - these are specifically fuses.  Once they're blown, they cannot be unblown.  And there are fuses which you can [...]

Secure Boot on the iMX6 – Part 22018-10-09T10:35:09+00:00

Secure Boot on the iMX6 – Part 1

2018-10-09T10:30:58+00:00

With the proliferation of IoT – spanning just about everything from smart cities to wireless jewellery – the need to prioritise security in secure embedded systems has never been greater. The secure boot process is one of the foundation stones of software development best practice. It’s a complex, necessary part of your application’s anti-malware fortress. In this 3-part series, we’re taking an in-depth look at the secure boot protocol, and will also tell you our top tips for executing secure boot on one of the most popular processors in electronics – the i.MX6. Secure Boot - What It Is, Where You’d Use It What is Secure Boot? Secure boot is a process where your OS [Operating System] boot images and code are required to be authenticated against the hardware [...]

Secure Boot on the iMX6 – Part 12018-10-09T10:30:58+00:00

Top 5 Tips For Developing Secure Android Applications

2018-10-09T12:05:55+00:00

These days, developing secure Android applications is more important than ever before. Android now commands 76% of the smartphone market in the EU5¹, 67% in the US and nearly 80% in China, according to latest figures². With numbers like that, it’s no wonder the Android application development gold rush is continuing; nearly a quarter of a million apps have been added to Google Play so far in 2016³. That’s an average of 1,379 apps every day! However, with Accessibility Clickjacking, Stagefright, Triada and other malware among the growing list of Android exploits, developers simply cannot afford to place security anywhere other than at top of the priority list. With that in mind, in this article we’re taking a look at some best practice tips for developing secure Android applications. [...]

Top 5 Tips For Developing Secure Android Applications2018-10-09T12:05:55+00:00

World’s 1st Dog Translation App: DingoLingo by ByteSnap

2018-10-09T12:20:27+00:00

Here at ByteSnap Design, we are excited to have taken the bond between Man and Dog to an unprecedented level, with our new, groundbreaking Android app: DingoLingo. We believe our DingoLingo dog translation app is a world first.  It follows extensive work and research, and is the brainchild of our Director – and resident dog whisperer - Dunstan Power.  See the World's First Dog Translation App DingoLingo in Action “It’s taken a few years to get it to this stage and we’re very proud of DingoLingo. It is part of the major Internet of Things phenomenon, and our speciality in developing smart devices has come to the fore in this innovative project,” says Dunstan, who firmly rejects criticism that the app is little more than a gimmick. “My staff [...]

World’s 1st Dog Translation App: DingoLingo by ByteSnap2018-10-09T12:20:27+00:00

Install Android 4.4 with Play Store on Wandboard in 7 Steps

2018-10-09T09:42:47+00:00

Happy New Year! The Wandboard is a really great imx6 development system that allows easy comparison of the performance of three of the processor variants. Here is a guide on how to get it up and running with Android KitKat. For this (apart from your Wandboard!), you'll need a PC running Linux, and a micro SD card no bigger than 4GB. In this tutorial we're using Ubuntu 14.04.1 amd64. Burning an image of Android 4.4 for Wandboard 1.Download The Image Download the prebuilt image of android 4.4 "android-4.4.2-wandboard-2014 0815" from Wandboard's official website and extract it. 2. Locate Your Micro SD Open a terminal and type lsblk to identify where your SD card is mounted, in my case this was sdc (Note: Not sdc1, sdc2, etc., which are the partitions of the mounted card, not the card [...]

Install Android 4.4 with Play Store on Wandboard in 7 Steps2018-10-09T09:42:47+00:00