To use our site, you agree to the use of cookies and data processing according to our privacy statement.
Close
Search

Riscure Blog

The attack known as Rolling-PWN (CVE-2021-46145) [1] is the latest of a recent series of security issues affecting the car’s immobilizers and RKEs (Remote Keyless Entry, also known as the keyfob or remote control). Over the past years, we have seen how security researchers identified attacks that could open and even start cars from vendors like Tesla [2], Hyundai-Kia [3], VAG (Volkswagen, Audi, Seat, Porsche, Skoda) [4], and others. This time, the targets of Rolling-PWN are Honda vehicles from 2012 to 2022.

09/08/2022
Learn more

Nikola Medic, Director of Sales Certification at Riscure, has been helping customers find the best way to meet their product deployment objectives for more than 5 years. In this interview, Nikola shares his experience with Riscure and explains the significance of Common Criteria certification.

10/08/2022
Learn more

Hertzbleed is a new side-channel attack that turns a power side channel into a timing side channel. That timing side channel may be exploitable even if the algorithm runs in a constant number of clock cycles. The novel observation is that the duration of a clock cycle can vary depending on the data processed on a CPU that uses dynamic frequency scaling. This allows a remote attacker to extract cryptographic keys under a few conditions.

06/07/2022
Learn more

The DRM is known to protect and encrypt content in order to deliver it to the device. DRM’s main purpose is to close the gaps in content protection strategies and enable content consumption on different devices to be easily accessible. As DRM technologies have matured, it is expected that their security capabilities will follow.

04/07/2022
Learn more

Hanna Humenyuk is an International Sales and Business Development Manager specializing in Mobile Payment Security at Riscure. Before joining Riscure, Hanna worked in FinTech for over 10 years. She comes from the traditional industry of payment cards and terminals and has witnessed the active shift in the Mobile Payment Security industry from hardware to software. Hanna also highlights the importance of human contact in building strong customer relationships.

04/07/2022
Learn more

Recently, Apple introduced a useful but potentially dangerous feature to its iPhones. Most of us would assume that a phone becomes inactive when switched off by the user or, due to low power. Surprisingly, newer phones continue limited functionality for several hours in low power mode or even if it is off. This includes cards in your Wallet and the Find My service. This feature caught the attention of TU Darmstadt, resulting in an interesting paper.

08/06/2022
Learn more

Siebe Krijgsman, Principal Engineer at Riscure, compares fundamental security topics to old action movies. He discusses the differences between various Riscure tools and the challenges of developing such security tools.

07/06/2022
Learn more

Experienced hackers know that successful exploits usually require a series of vulnerabilities, the stepping stones. The combination of these vulnerabilities enables the attack path, and all of them are needed.

12/05/2022
Learn more

Praveen Vadnala, a principal security analyst, encourages companies to consider the security of their devices during all stages of the development lifecycle, and the earlier, the better.

11/05/2022
Learn more