Hewlett-Packard’s tiny Memory Spot chip is designed to put digital information on documents and photos. However, the chip’s size and wireless capability can also be used by corporate thieves to copy and steal valuable data.While the Memory Spot presents an added security challenge for companies, the risk can be managed, said James McQuivey, a professor at Boston University’s College of Communication.Unveiled on Monday, the prototype Memory Spot is roughly the same size as a grain of rice and can store up to four megabits of information. There are eight bits in a byte. The chip has an antenna that can transfer data at speeds up to 10Mbps and doesn’t require its own power source. Instead, the chip draws its power from a chip reader through a process called inductive coupling, which allows power to cross from one component to another over a shared electromagnetic field.Data stored on Memory Spot chips could be accessed using a variety of devices, such as specially equipped cell phones or PDAs, making them suitable for a range of applications, such as stickers applied to a paper document or printed photograph, HP said. There are other possibilities. Memory Spot, which is not expected to be commercially available for several years, is just one of many devices that can be used by thieves to download and steal corporate information. Corporate security managers already face this threat from USB flash drives, portable hard disks, camera-equipped cell phones and other devices.“If you can’t manage those today, the Memory Spot will be just another in a long line of possible data loss devices,” McQuivey said. Companies that have put strong security policies in place will be able to handle advances in technology that make it possible to steal data, he said. Memory Spot also offers an opportunity for companies, which can use them to disseminate product brochures and even video, such as commercials, McQuivey said. “This can be as much a positive thing for companies as a negative,” he said.-Sumner Lemon, IDG News Service (Beijing Bureau)Keep checking in at our Security Feed page for updated news coverage. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe