Tip / Sign in to post questions, reply, level up, and achieve exciting badges. Know more

Blogs - Page 26

icon

Blogs

thumbnail
Excelon™, Cypress’ next-generation Ferroelectric RAM (F-RAM), delivers industry’s highest-performance mission-critical non-volatile memory by combining high-speed low-pin-count interfaces, low-power operation, unlimited read/write cycle endurance and instant non-volatility. This makes Excelon the highest-reliability data-logging memory for smart connected factories and the automobiles of tomorrow. Please find additional details here.The Excelon™ Ultra is a 4-Mbit, 108-MHz Quad SPI F-RAM that supports a rich command set making it compatible with the industry standard Quad SPI peripheral command set. With the industry moving towards low pin count interfaces, a wide variety of micro-controllers have started supporting Quad SPI interface natively. To enable the evaluation of our latest Quad SPI F-RAM in conjunction with industry standard platforms, we will be providing simple driver support for a few of these platforms through Cypress Community. These drivers can be used as-is or with minor modification by embedded systems engineers to get a headstart in adding a high-speed, low-power data-logging memory in the system.The attached files contain a user guide for the code, a sample test project in Keil µVision 5 and LPCExpresso. The sample project contains revision 1.0 of API library files which covers all the important device access features. Sample project files are also available in GitHub repository, click here.Follow this blog to get updates on release of support for more micro-controllers!
thumbnail
WICED-Studio 5.2.1 Installer (Windows)WICED-Studio-5.2.1 (OSX)WICED-Studio-5.2.1 (Linux 64-bit)WICED-Studio-5.2.1 (Linux 32-bit)Release Notes: WICED Studio 5.2.1New WLAN firmware (5.90.230.22) added for 43362 platform with KRACK WPA2 fixesNew WLAN firmware (7.45.98.38) added for 43364/43438/4343W platforms with KRACK WPA2 fixesNew WLAN firmware (7.15.168.101) added for 4390x/54907 platform with KRACK WPA2 fixesNew WLAN firmware (6.49.22) added for 43340 platform with KRACK WPA2 fixes
thumbnail
mifo​We have a product with the CYW43362 chipset based on SDK version 3.1.2. We would like to provide OTA patches for the KRACK vulnerabilities. Based on the previously released WPA2-KRACK-HACK-statement, we’re subject to the group 2 CVEs. Can you shed light on what is the best path to patch our product? Will there be updates for SDK 3.2.1? Or is it possible to OTA upgrade SDK 3.2.1 based field hardware with SDK 6.0. The latter is a less preferred method for us and I ask because in the past upgrading SDK 2.X with SDK 3.X based firmware was not possible over-the-air.My firmware version information is under:WLAN Firmware : wl0: Nov 7 2014 16:03:45 version 5.90.230.12 FWID 01-e36c94fdThanks
thumbnail
WICED Studio 4.1.3 IDE Installer (Windows) WICED Studio 4.1.3 (OSX) WICED Studio 4.1.3 (Linux 64-bit) WICED Studio 4.1.3 (Linux 32-bit) Release Notes: WICED Studio 4.1.3 New WLAN firmware (7.45.98.38) added for BCM43364/BCM43438/BCM4343W that includes KRACK WPA2 and Broadpwn fixes. New WLAN firmware (6.49.22) added for BCM943340 that includes KRACK WPA2 and Broadpwn fixes. New WLAN firmware (5.90.230.22) added for BCM943362 that includes KRACK WPA2 and Broadpwn fixes. New WLAN firmware (7.15.168.101) added for BCM94390x that includes KRACK WPA2 and Broadpwn fixes.
thumbnail
Recently, most of our buyers are worried about WPA2 security problem. So can you please let us know the following? 1. Do you have a patch for WPA2 security issue? 2. If not, then do you have a plan when you will be able to provide? 3. If yes, then is is possible to get a patch which can be applied to SDK2.4,1? Thank you for your help.
thumbnail
Per the original bulletin here: Security Bulletin: KRACK attack against implementations of Wi-Fi WPA2 security This update includes the promised wpa_supplicant patches.
thumbnail
Cypress is aware and has analyzed the vulnerabilities associated with the recently released KRACK attack (https://www.krackattacks.com) against implementations of the Wi-Fi WPA2 security.Official details of the vulnerability are tracked via a number of Common Vulnerabilities and Exposures, or CVEs. CVEs can be looked up at https://cve.mitre.org.
thumbnail
See https://www.armis.com/blueborne/What Armis discovered were primarily weaknesses in standard (not LE) Bluetooth stacks on Windows, iOS and Linux, but a quick look at their white paper raises some questions, and our customers are legitimately concerned.Could the attack vectors detailed in the Blueborne white paper be used to compromise BLE devices built with the BCM20736?