Research

The Unsolvable Problem of Insider Threats

The Unsolvable Problem of Insider Threats

This is a rare occurrence for a Chief Intelligence Officer to be arrested on such serious criminal charges, and frankly, it would have been almost unthinkable just a few years ago. First Published 25th September 2019 "Pssst. Do you have a pen? It's admin, admin." 4 min read | Reflare …

Read Story

What the Ecuadorian Data Breach Can Teach Us

The unsecured database contained records for every registered citizen of Ecuador, which included sensitive information, including their name, address, voting preferences, and even their government ID number. First Published 18th September 2019 Thanks to this data leak, some Ecuadorian …

Read Story

China, Uyghur Smartphones and the Power of State Actors

Surveillance malware is commonly used to track a target’s messages, conversations and location, and this is not the first time that such technology has been used by a country against its own people. First Published 10th September 2019 The role of cyber security in global geopolitics w …

Read Story

What Twitter's CEO's Own Account Getting Hacked Tells Us About Phone Security

Phone numbers are not secure, as Jack Dorsey has found out the hard way. Assailants were able to gain access to his phone number and then used that access remotely to take control of his Twitter account. First Published 4th September 2019 Jack lets everyone know "what's happening." 4 …

Read Story

YouTube Moves to Prohibit Hacking Videos

YouTube explicitly made a change to its Harmful and Dangerous Content policy by prohibiting videos that were instructional in nature that contained duplicating, accessing or exploiting data on websites. First Published 9th July 2019 | Latest Refresh 3rd September 2022 Is there a negat …

Read Story

Subscribe by email