Blog

Defeating RSA Countermeasures

Defeating RSA Countermeasures

Defeating RSA Multiply-Always and Message Blinding Countermeasures from Riscure
How multi-fault injection breaks the security of smart cards

How multi-fault injection breaks the security of smart cards

How multi-fault injection breaks the security of smart cards from Riscure
Why are we still vulnerable to Side Channel Attacks?

Why are we still vulnerable to Side Channel Attacks?

Why are we still vulnerable to Side Channel Attacks? from Riscure
How to secure electronic passports

How to secure electronic passports

How to secure electronic passports from Riscure
Java Card Security

Java Card Security

Java Card Security from Riscure
Security Highlight: Device lifespan implications on security

Security Highlight: Device lifespan implications on security

Electronic devices have a limited lifetime. Not so much because the electronics wear out, but because the technology ages. A typical example is a smartphone. People replace them because they ...
Security Highlight: Multi-fault attacks are practical

Security Highlight: Multi-fault attacks are practical

Hardware Fault Injection is increasingly recognized as a dangerous alternative, or prelude, to pure software attacks. While FI attacks are often technically complex and require physical access ...
Security Highlight: 5G Device Connectivity is not an attack target, but an attack enabler

Security Highlight: 5G Device Connectivity is not an attack target, but an attack enabler

On the device side, we can distinguish the 5G communication stack and the non-communication part of the device (including the hardware, OS, and applications).
Security Highlight: How bad is the Apple AirTag hack?

Security Highlight: How bad is the Apple AirTag hack?

Apple recently introduced the AirTag, a small 30$ device that helps you locate lost or stolen items.
Is software security attainable?

Is software security attainable?

Software security is widely considered an increasing concern. Daily reports of data breaches and hacked products feed the perception that everything is broken.
Security Highlight: How Hackers Obtain Remote-Code-Execution in WhatsApp

Security Highlight: How Hackers Obtain Remote-Code-Execution in WhatsApp

CENSUS Labs has recently identified several vulnerabilities in the popular WhatsApp Android application.
Analyzing developments in the latest version of the Movielabs’ Enhanced Content Protection Specification

Analyzing developments in the latest version of the Movielabs’ Enhanced Content Protection Specification

In this blog post will highlight some interesting developments introduced in this new version of the specification that are worth the attention of content protection professionals.
Security evaluation of a smart device: D-Link DIR 2680 router

Security evaluation of a smart device: D-Link DIR 2680 router

In this blog post, Riscure’s security analyst Naasa Fikri and senior trainer/senior security analyst Yashin Mehaboobe illustrate a common approach for a light security assessment of smart home ...
Security Highlight: The Difficulty of Securing a Mobile Phone

Security Highlight: The Difficulty of Securing a Mobile Phone

Our team did a deep dive into TEEGRIS, the newest TEE of Samsung. As a result, we proved that this TEE, introduced in 2019 for the Galaxy S10, can be fully compromised by a determined expert. ...