Blog

No results found.
Security Highlight: SmashEx threatens SGX applications on Intel chips

Security Highlight: SmashEx threatens SGX applications on Intel chips

Researchers from universities in Singapore, China, and Switzerland have discovered a novel way to compromise the security of SGX, the Trusted Execution Environment provided by Intel. The attack ...
New ISO/SAE 21434 security standard and its effect on the industry

New ISO/SAE 21434 security standard and its effect on the industry

Recently, the new ISO/SAE 21434 security standard was published. The publication of the long-awaited standard marks a major milestone in automotive security.
Security highlight: What did we learn in 20 years of security evaluation?

Security highlight: What did we learn in 20 years of security evaluation?

This month we celebrate 20 years of Riscure, and, as it happens, device security evaluation and certification emerged during that period. Whereas regulation is still limited to the most ...
Security Highlight: Device lifespan implications on security

Security Highlight: Device lifespan implications on security

Electronic devices have a limited lifetime. Not so much because the electronics wear out, but because the technology ages. A typical example is a smartphone. People replace them because they ...
Security Highlight: Multi-fault attacks are practical

Security Highlight: Multi-fault attacks are practical

Hardware Fault Injection is increasingly recognized as a dangerous alternative, or prelude, to pure software attacks. While FI attacks are often technically complex and require physical access ...
Security Highlight: 5G Device Connectivity is not an attack target, but an attack enabler

Security Highlight: 5G Device Connectivity is not an attack target, but an attack enabler

On the device side, we can distinguish the 5G communication stack and the non-communication part of the device (including the hardware, OS, and applications).
Security Highlight: How bad is the Apple AirTag hack?

Security Highlight: How bad is the Apple AirTag hack?

Apple recently introduced the AirTag, a small 30$ device that helps you locate lost or stolen items.
Is software security attainable?

Is software security attainable?

Software security is widely considered an increasing concern. Daily reports of data breaches and hacked products feed the perception that everything is broken.
Security Highlight: How Hackers Obtain Remote-Code-Execution in WhatsApp

Security Highlight: How Hackers Obtain Remote-Code-Execution in WhatsApp

CENSUS Labs has recently identified several vulnerabilities in the popular WhatsApp Android application.