Security Highlight

Security Highlight: Side-Channel Vulnerability in Infineon Cryptographic Library

Security Highlight: Side-Channel Vulnerability in Infineon Cryptographic Library

Reading the EUCLEAK paper provides a detailed journey through the ups and downs of carrying out a blackbox attack.
Security Highlight: Backdoor Key Found in MIFARE Classic Cards

Security Highlight: Backdoor Key Found in MIFARE Classic Cards

A recent discovery by security researcher Philippe Teuwen and the Proxmark3 community has revealed a significant backdoor in several widely used MIFARE Classic RFID cards.
Security Highlight: Understanding Fault Injection in Neural Networks for Edge Devices

Security Highlight: Understanding Fault Injection in Neural Networks for Edge Devices

This blog post discusses the challenges of extending device security concepts to cover neural networks.
Security Highlight: The Potential Impact of Hardware Security Weaknesses

Security Highlight: The Potential Impact of Hardware Security Weaknesses

This security highlight discusses the recent NIST report on hardware weaknesses, relating to Riscure's experience in the field. 
Security Highlight: The impact of the XZ backdoor. Can we still trust open source?

Security Highlight: The impact of the XZ backdoor. Can we still trust open source?

Marc Witteman talks about a recent attack on an open source package and evaluates the possibility of planting malicious functionality in hardware.
Security Highlight: Unveiling EM Eye – a new vulnerability in embedded cameras

Security Highlight: Unveiling EM Eye – a new vulnerability in embedded cameras

This security highlight discusses the recent EM Eye vulnerability discovery, its practical implications, challenges, and potential countermeasures.
Security Highlight: Post-Quantum Cryptography on Embedded: challenges and opportunities

Security Highlight: Post-Quantum Cryptography on Embedded: challenges and opportunities

We are moving to an era where quantum computing threatens the confidentiality of current cryptographic protocols, specifically around "harvest now, decrypt later" attacks: the ability to store ...
Security Highlight: Back in the Driver’s Seat

Security Highlight: Back in the Driver’s Seat

How a Fault Injection compromised a vehicle's autopilot system as showcased by TU Berlin experts at the CCC conference.
Security Highlight: The practical implications of RowPress

Security Highlight: The practical implications of RowPress

Uncover the technical details, practicality, and potential risks associated with RowPress.
Security Highlight: Side-Channel Vulnerability in Infineon Cryptographic Library

Security Highlight: Side-Channel Vulnerability in Infineon Cryptographic Library

Reading the EUCLEAK paper provides a detailed journey through the ups and downs of carrying out a blackbox attack.
Security Highlight: Backdoor Key Found in MIFARE Classic Cards

Security Highlight: Backdoor Key Found in MIFARE Classic Cards

A recent discovery by security researcher Philippe Teuwen and the Proxmark3 community has revealed a significant backdoor in several widely used MIFARE Classic RFID cards.
Security Highlight: Understanding Fault Injection in Neural Networks for Edge Devices

Security Highlight: Understanding Fault Injection in Neural Networks for Edge Devices

This blog post discusses the challenges of extending device security concepts to cover neural networks.
Security Highlight: The Potential Impact of Hardware Security Weaknesses

Security Highlight: The Potential Impact of Hardware Security Weaknesses

This security highlight discusses the recent NIST report on hardware weaknesses, relating to Riscure's experience in the field. 
Security Highlight: The impact of the XZ backdoor. Can we still trust open source?

Security Highlight: The impact of the XZ backdoor. Can we still trust open source?

Marc Witteman talks about a recent attack on an open source package and evaluates the possibility of planting malicious functionality in hardware.
Security Highlight: Unveiling EM Eye – a new vulnerability in embedded cameras

Security Highlight: Unveiling EM Eye – a new vulnerability in embedded cameras

This security highlight discusses the recent EM Eye vulnerability discovery, its practical implications, challenges, and potential countermeasures.
Security Highlight: Post-Quantum Cryptography on Embedded: challenges and opportunities

Security Highlight: Post-Quantum Cryptography on Embedded: challenges and opportunities

We are moving to an era where quantum computing threatens the confidentiality of current cryptographic protocols, specifically around "harvest now, decrypt later" attacks: the ability to store ...
Security Highlight: Back in the Driver’s Seat

Security Highlight: Back in the Driver’s Seat

How a Fault Injection compromised a vehicle's autopilot system as showcased by TU Berlin experts at the CCC conference.
Security Highlight: The practical implications of RowPress

Security Highlight: The practical implications of RowPress

Uncover the technical details, practicality, and potential risks associated with RowPress.