Security Trends

Security Takes the Front Seat in Automotive

Security Takes the Front Seat in Automotive

Modern cars are becoming more reliant on complex computer systems, leading to shifts in business models and product lifecycles in the automotive industry.
How to Tame a Light Switch

How to Tame a Light Switch

In a recent publication, Riscure illustrated the analysis and testing of a commercially available smart light switch. By understanding the methods used to exploit these devices, we can take ...
From Card Skimming to Card Shimming: Legacy remains at risk

From Card Skimming to Card Shimming: Legacy remains at risk

Card skimming is an attack aimed to capture sensitive data on payment cards. Read about the current trends and developments in card skimming.
Understanding RFID Technology and Its Security Implications

Understanding RFID Technology and Its Security Implications

In this article, our team delves into the intricacies of RFID technology, highlighting its various applications while uncovering potential security implications that may be present within these ...
Approaching effective Crypto Wallet security evaluation

Approaching effective Crypto Wallet security evaluation

Unlike traditional payment systems, the cryptocurrency landscape lacks industry-recognized security certification programs. In this blogpost, we talk about potential approaches to hardware ...
Flipper Zero – The Controversial Pentesting Tool That Went Viral

Flipper Zero – The Controversial Pentesting Tool That Went Viral

Flipper Zero - a pocket-sized hacking tool - is stirring debates in the device security community.
Security Takes the Front Seat in Automotive

Security Takes the Front Seat in Automotive

Modern cars are becoming more reliant on complex computer systems, leading to shifts in business models and product lifecycles in the automotive industry.
How to Tame a Light Switch

How to Tame a Light Switch

In a recent publication, Riscure illustrated the analysis and testing of a commercially available smart light switch. By understanding the methods used to exploit these devices, we can take ...
From Card Skimming to Card Shimming: Legacy remains at risk

From Card Skimming to Card Shimming: Legacy remains at risk

Card skimming is an attack aimed to capture sensitive data on payment cards. Read about the current trends and developments in card skimming.
Understanding RFID Technology and Its Security Implications

Understanding RFID Technology and Its Security Implications

In this article, our team delves into the intricacies of RFID technology, highlighting its various applications while uncovering potential security implications that may be present within these ...
Approaching effective Crypto Wallet security evaluation

Approaching effective Crypto Wallet security evaluation

Unlike traditional payment systems, the cryptocurrency landscape lacks industry-recognized security certification programs. In this blogpost, we talk about potential approaches to hardware ...
Flipper Zero – The Controversial Pentesting Tool That Went Viral

Flipper Zero – The Controversial Pentesting Tool That Went Viral

Flipper Zero - a pocket-sized hacking tool - is stirring debates in the device security community.