Security Highlight

Security Highlight: Multi-fault attacks are practical

Security Highlight: Multi-fault attacks are practical

Hardware Fault Injection is increasingly recognized as a dangerous alternative, or prelude, to pure software attacks. While FI attacks are often technically complex and require physical access ...
Security Highlight: 5G Device Connectivity is not an attack target, but an attack enabler

Security Highlight: 5G Device Connectivity is not an attack target, but an attack enabler

On the device side, we can distinguish the 5G communication stack and the non-communication part of the device (including the hardware, OS, and applications).
Security Highlight: How bad is the Apple AirTag hack?

Security Highlight: How bad is the Apple AirTag hack?

Apple recently introduced the AirTag, a small 30$ device that helps you locate lost or stolen items.
Security Highlight: How Hackers Obtain Remote-Code-Execution in WhatsApp

Security Highlight: How Hackers Obtain Remote-Code-Execution in WhatsApp

CENSUS Labs has recently identified several vulnerabilities in the popular WhatsApp Android application.
Security Highlight: The Difficulty of Securing a Mobile Phone

Security Highlight: The Difficulty of Securing a Mobile Phone

Our team did a deep dive into TEEGRIS, the newest TEE of Samsung. As a result, we proved that this TEE, introduced in 2019 for the Galaxy S10, can be fully compromised by a determined expert. ...
Security Highlight: What it takes to hack a tesla and what it means for device makers

Security Highlight: What it takes to hack a tesla and what it means for device makers

KU Leuven's security research group COSIC has a strong track record in studying Tesla security and demonstrated attacks on model S in 2018 and 2019. This time, they broke model X and applied ...
Security Highlight: a Journey to Titan

Security Highlight: a Journey to Titan

Recently, NinjaLab investigated Titan, a two-factor authentication token offered by Google, and broke its secure crypto implementation.
Security Highlight: The real threat of Amnesia-33

Security Highlight: The real threat of Amnesia-33

At the end of last year, ForeScout analyzed seven open-source software libraries and found a set of 33 vulnerabilities in four of them (uip, picoTCP, FNET, Nut/Net). Three of these ...
Security highlight: the impact of Platypus

Security highlight: the impact of Platypus

Recently a new power-side channel attack, which was named Platypus. At Riscure, we can determine whether your product is vulnerable to Platypus.
Security Highlight: Multi-fault attacks are practical

Security Highlight: Multi-fault attacks are practical

Hardware Fault Injection is increasingly recognized as a dangerous alternative, or prelude, to pure software attacks. While FI attacks are often technically complex and require physical access ...
Security Highlight: 5G Device Connectivity is not an attack target, but an attack enabler

Security Highlight: 5G Device Connectivity is not an attack target, but an attack enabler

On the device side, we can distinguish the 5G communication stack and the non-communication part of the device (including the hardware, OS, and applications).
Security Highlight: How bad is the Apple AirTag hack?

Security Highlight: How bad is the Apple AirTag hack?

Apple recently introduced the AirTag, a small 30$ device that helps you locate lost or stolen items.
Security Highlight: How Hackers Obtain Remote-Code-Execution in WhatsApp

Security Highlight: How Hackers Obtain Remote-Code-Execution in WhatsApp

CENSUS Labs has recently identified several vulnerabilities in the popular WhatsApp Android application.
Security Highlight: The Difficulty of Securing a Mobile Phone

Security Highlight: The Difficulty of Securing a Mobile Phone

Our team did a deep dive into TEEGRIS, the newest TEE of Samsung. As a result, we proved that this TEE, introduced in 2019 for the Galaxy S10, can be fully compromised by a determined expert. ...
Security Highlight: What it takes to hack a tesla and what it means for device makers

Security Highlight: What it takes to hack a tesla and what it means for device makers

KU Leuven's security research group COSIC has a strong track record in studying Tesla security and demonstrated attacks on model S in 2018 and 2019. This time, they broke model X and applied ...
Security Highlight: a Journey to Titan

Security Highlight: a Journey to Titan

Recently, NinjaLab investigated Titan, a two-factor authentication token offered by Google, and broke its secure crypto implementation.
Security Highlight: The real threat of Amnesia-33

Security Highlight: The real threat of Amnesia-33

At the end of last year, ForeScout analyzed seven open-source software libraries and found a set of 33 vulnerabilities in four of them (uip, picoTCP, FNET, Nut/Net). Three of these ...
Security highlight: the impact of Platypus

Security highlight: the impact of Platypus

Recently a new power-side channel attack, which was named Platypus. At Riscure, we can determine whether your product is vulnerable to Platypus.