Blog

No results found.
How to determine the cost of an attack objectively?

How to determine the cost of an attack objectively?

Setting priorities right is very important when it comes to security. As a developer of a software and/or hardware solution, you simply cannot chase every single bug or design issue. If you know ...
The threat of Fault Injection: Riscure discovers a vulnerability in an affordable IoT solution

The threat of Fault Injection: Riscure discovers a vulnerability in an affordable IoT solution

Riscure has discovered a serious vulnerability in an affordable ESP32 IoT solution developed by Espressif Systems.
Justin, the OEM and the automotive cybersecurity requirements: Part 3

Justin, the OEM and the automotive cybersecurity requirements: Part 3

Justin is on the phone with Alex from Riscure, discussing how to address security requirements from the OEM. After some minutes, Justin realized he needs to align with Chris from the OEM on what ...
Justin, the OEM and the automotive cybersecurity requirements: Part 2

Justin, the OEM and the automotive cybersecurity requirements: Part 2

Justin, the OEM and the automotive cybersecurity requirements: Part 2
Glitching the KeepKey hardware wallet

Glitching the KeepKey hardware wallet

In this article we show an attack on unmodified KeepKey hardware cryptowallet, which uses electro-magnetic fault injection.
Justin, the OEM and the automotive cybersecurity requirements

Justin, the OEM and the automotive cybersecurity requirements

As a functional safety engineer, Justin has many years of experience in delivering E/E systems.
On the security (or lack thereof) of the connected IoT thermostat

On the security (or lack thereof) of the connected IoT thermostat

My name is Kevin Valk and I am a Security Analyst at Riscure working mainly in mobile security (e.g. payments, HCE, MPOS, etc).
Analyzing the security of Android mobile payment applications

Analyzing the security of Android mobile payment applications

Riscure's researchers analyzed more than 426 Android payment applications, downloaded directly from the Google App Store.
Approaches to detect a hardware implant

Approaches to detect a hardware implant

Though hardware implants have been a big topic of discussion in the past weeks due to the Bloomberg story, they have been researched for many years.