Blog

Five things you should know to avoid the most common security errors

Five things you should know to avoid the most common security errors

For more than 20 years Riscure has been helping chip and device vendors to improve the security of their products. We have observed the ever-changing security landscape, adjusted to the evolving ...
3 Reasons Why Your Payment App Needs To Get EMVCo Certified

3 Reasons Why Your Payment App Needs To Get EMVCo Certified

Riscure worked together with Promon to define why mobile app providers should consider getting EMVCo Software-Based Mobile Payment (SBMP) certification.
Security certification considerations when choosing a secure product

Security certification considerations when choosing a secure product

Understanding Common Criteria and Evaluation Assurance Levels, and putting these into context when choosing secure products and services.
The Price We Pay for Fault Injection

The Price We Pay for Fault Injection

This new paper describes the background and risks of Fault Injection.
The Price We Pay for Faults: Video Webinar

The Price We Pay for Faults: Video Webinar

Tune into our recent webinar presented by Riscure's CEO Marc Witteman, as he breaks down the dollars and cents of Fault Injection.
State of Security for Smart Home Devices

State of Security for Smart Home Devices

Recently, Riscure analyzed the security of commonly used smart home devices such as WiFi routers, gateways, door locks, and cameras.
Fault Mitigation Patterns

Fault Mitigation Patterns

To make it easier for developers to protect their security-critical devices, Riscure created this paper discussing patterns that can cost-effectively mitigate the code.
From Classical Smartcards to Integrated Secure Elements

From Classical Smartcards to Integrated Secure Elements

In this paper Riscure expert provide insights into the complex evaluation of integrated Secure Element (iSE) in System-on-Chip (SoC).
Broadband service providers – a security view

Broadband service providers – a security view

This paper provides insights into the security of broadband service providers.
Shimano Di2 vulnerability: let’s talk about device security in sports

Shimano Di2 vulnerability: let’s talk about device security in sports

Integrating technology into new domains can introduce unexpected vulnerabilities. In this blog post, let's talk about the recent discovery of a security flaw in Shimano's Di2 wireless ...
My Internship at Riscure: Yuezhou Lyu

My Internship at Riscure: Yuezhou Lyu

In this blog post, Yuezhou Lyu shares his internship journey at Riscure.
Understanding the FIPS 140-3 Requirements for Cryptographic Devices

Understanding the FIPS 140-3 Requirements for Cryptographic Devices

The blog post discusses the updated Federal Information Processing Standard (FIPS) 140-3 for cryptographic devices, highlighting its new security requirements and levels, the challenges in ...
My Internship at Riscure: Mans van Someren

My Internship at Riscure: Mans van Someren

In this blog post, Mans van Someren shares his internship journey at Riscure.
Security Highlight: Understanding Fault Injection in Neural Networks for Edge Devices

Security Highlight: Understanding Fault Injection in Neural Networks for Edge Devices

This blog post discusses the challenges of extending device security concepts to cover neural networks.
Gaming Consoles as a Frontier in Hardware Attacks

Gaming Consoles as a Frontier in Hardware Attacks

In this blog post we collected a number of notable examples of hardware exploits in gaming consoles over the years.
Security Highlight: The Potential Impact of Hardware Security Weaknesses

Security Highlight: The Potential Impact of Hardware Security Weaknesses

This security highlight discusses the recent NIST report on hardware weaknesses, relating to Riscure's experience in the field. 
My internship at Riscure: Daan de Heij

My internship at Riscure: Daan de Heij

In this blog post, Daan de Heij shares his internship journey at Riscure.
Security Highlight: The impact of the XZ backdoor. Can we still trust open source?

Security Highlight: The impact of the XZ backdoor. Can we still trust open source?

Marc Witteman talks about a recent attack on an open source package and evaluates the possibility of planting malicious functionality in hardware.