Research

Governments, Politics & Cyber Warfare

There are three types of targets in military operations: hard, soft and targets of opportunity. In terms of cyber assignments, the same approach can be used for cyber attacks. First Published 27th July 2016 Cyber-geopolitics is gaining momentum. 4 min read | Reflare Research Team This …

Read Story

The Security of ATMs

The Security of ATMs

With a large number of ATMs still running Windows XP and Windows NT4, it is becoming increasingly important to understand what the risks are in deploying these older operating systems in the modern threat landscape. First Published 20th July 2016 Insufficient funds. 4 min read | Refla …

Read Story

Criminal Overlap: The Hacking Theft of Cars

While stealing a car is nothing new, the increasing ease of doing so, combined with how long thieves are able to use stolen cars before they get flagged, makes this security threat especially worrisome. First Published 7th July 2016 "Congratulations! You've won a NEW CAAAARRRR!!!" 4 m …

Read Story

Subscribe by email