Security Highlight

Security Highlight: Hertzbleed – prime time for power side channel countermeasures or novelty attack?

Security Highlight: Hertzbleed – prime time for power side channel countermeasures or novelty attack?

Hertzbleed is a new side-channel attack that turns a power side channel into a timing side channel. That timing side channel may be exploitable even if the algorithm runs in a constant number of ...
Security Highlight: Evil Never Sleeps

Security Highlight: Evil Never Sleeps

Recently, Apple introduced a useful but potentially dangerous feature to its iPhones. Most of us would assume that a phone becomes inactive when switched off by the user or, due to low power. ...
Security highlight: Attack Stepping Stones

Security highlight: Attack Stepping Stones

Experienced hackers know that successful exploits usually require a series of vulnerabilities, the stepping stones. The combination of these vulnerabilities enables the attack path, and all of ...
Security Highlight: Risks of chip shortage

Security Highlight: Risks of chip shortage

The global chip shortage is leading to a variety of issues in electronics supply chains, from lead times of over two years to ten-fold price increases. Riscure has seen examples of such ...
Security Highlight: The Return of Rowhammer

Security Highlight: The Return of Rowhammer

Do you remember the Rowhammer attack? This surprising attack published in 2015 exploited cross-talk between DRAM memory cells. In this type of memory, data is stored in tiny capacitors that are ...
Security Highlight: What to expect after the PS5 root key discovery?

Security Highlight: What to expect after the PS5 root key discovery?

On November 8, failOverflow reported finding the PS5 root keys for symmetric encryption. At first glance, this find may seem harmless as it will not directly provide code execution privileges. ...
Security Highlight: SmashEx threatens SGX applications on Intel chips

Security Highlight: SmashEx threatens SGX applications on Intel chips

Researchers from universities in Singapore, China, and Switzerland have discovered a novel way to compromise the security of SGX, the Trusted Execution Environment provided by Intel. The attack ...
Security highlight: What did we learn in 20 years of security evaluation?

Security highlight: What did we learn in 20 years of security evaluation?

This month we celebrate 20 years of Riscure, and, as it happens, device security evaluation and certification emerged during that period. Whereas regulation is still limited to the most ...
Security Highlight: Device lifespan implications on security

Security Highlight: Device lifespan implications on security

Electronic devices have a limited lifetime. Not so much because the electronics wear out, but because the technology ages. A typical example is a smartphone. People replace them because they ...
Security Highlight: Hertzbleed – prime time for power side channel countermeasures or novelty attack?

Security Highlight: Hertzbleed – prime time for power side channel countermeasures or novelty attack?

Hertzbleed is a new side-channel attack that turns a power side channel into a timing side channel. That timing side channel may be exploitable even if the algorithm runs in a constant number of ...
Security Highlight: Evil Never Sleeps

Security Highlight: Evil Never Sleeps

Recently, Apple introduced a useful but potentially dangerous feature to its iPhones. Most of us would assume that a phone becomes inactive when switched off by the user or, due to low power. ...
Security highlight: Attack Stepping Stones

Security highlight: Attack Stepping Stones

Experienced hackers know that successful exploits usually require a series of vulnerabilities, the stepping stones. The combination of these vulnerabilities enables the attack path, and all of ...
Security Highlight: Risks of chip shortage

Security Highlight: Risks of chip shortage

The global chip shortage is leading to a variety of issues in electronics supply chains, from lead times of over two years to ten-fold price increases. Riscure has seen examples of such ...
Security Highlight: The Return of Rowhammer

Security Highlight: The Return of Rowhammer

Do you remember the Rowhammer attack? This surprising attack published in 2015 exploited cross-talk between DRAM memory cells. In this type of memory, data is stored in tiny capacitors that are ...
Security Highlight: What to expect after the PS5 root key discovery?

Security Highlight: What to expect after the PS5 root key discovery?

On November 8, failOverflow reported finding the PS5 root keys for symmetric encryption. At first glance, this find may seem harmless as it will not directly provide code execution privileges. ...
Security Highlight: SmashEx threatens SGX applications on Intel chips

Security Highlight: SmashEx threatens SGX applications on Intel chips

Researchers from universities in Singapore, China, and Switzerland have discovered a novel way to compromise the security of SGX, the Trusted Execution Environment provided by Intel. The attack ...
Security highlight: What did we learn in 20 years of security evaluation?

Security highlight: What did we learn in 20 years of security evaluation?

This month we celebrate 20 years of Riscure, and, as it happens, device security evaluation and certification emerged during that period. Whereas regulation is still limited to the most ...
Security Highlight: Device lifespan implications on security

Security Highlight: Device lifespan implications on security

Electronic devices have a limited lifetime. Not so much because the electronics wear out, but because the technology ages. A typical example is a smartphone. People replace them because they ...