Reflare Research Team

Posts by Reflare Research Team

The Commoditisation of Hacking

The commoditisation of hacking tools, materials, and services is an uncomfortable trend that is slowly becoming visible as more hackers work together to share information on how to exploit vulnerabilities. First Published 21st November 2019 It's just like selling shovels in a gold rus …

Read Story

Voting Machines - Absolutely everything is a tradeoff decision

Voting Machines - Absolutely everything is a tradeoff decision

There is no such thing as pure security. You can only make tradeoff decisions, and in the case of voting machines, those decisions are made very, very publicly. The entire world can watch you make your tradeoffs, and they can ask you to defend those decisions later. First Published 8t …

Read Story

Putting Breach Awareness into a Historical Context

Putting Breach Awareness into a Historical Context

How is the world of data breach awareness changing? Is there a shift from protecting companies to protecting individuals? And if so, where does all this awareness lead us to in contrast to where we've been? First Published 30th October 2019 There is a lot we can learn about the future …

Read Story

On Bad Solutions and Negative Returns

On Bad Solutions and Negative Returns

"If only. If only there were some sort of top-secret method of cyber security that hardened your network, protected your servers and applications, and did so in a way that was seamless, invisible, reliable, and not too terribly expensive." *cough* First Published 16th October 2019 Hyg …

Read Story

The Dual Nature of Jailbreaks

Some are frustrated by imposed restrictions and would like to move their device away from its “stock” settings. However, jailbreaking allows users to do many things that most of the general public might not realise is possible. First Published 2nd October 2019 I want to break freeee. …

Read Story

The Unsolvable Problem of Insider Threats

The Unsolvable Problem of Insider Threats

This is a rare occurrence for a Chief Intelligence Officer to be arrested on such serious criminal charges, and frankly, it would have been almost unthinkable just a few years ago. First Published 25th September 2019 "Pssst. Do you have a pen? It's admin, admin." 4 min read | Reflare …

Read Story

What the Ecuadorian Data Breach Can Teach Us

The unsecured database contained records for every registered citizen of Ecuador, which included sensitive information, including their name, address, voting preferences, and even their government ID number. First Published 18th September 2019 Thanks to this data leak, some Ecuadorian …

Read Story

China, Uyghur Smartphones and the Power of State Actors

Surveillance malware is commonly used to track a target’s messages, conversations and location, and this is not the first time that such technology has been used by a country against its own people. First Published 10th September 2019 The role of cyber security in global geopolitics w …

Read Story

What Twitter's CEO's Own Account Getting Hacked Tells Us About Phone Security

Phone numbers are not secure, as Jack Dorsey has found out the hard way. Assailants were able to gain access to his phone number and then used that access remotely to take control of his Twitter account. First Published 4th September 2019 Jack lets everyone know "what's happening." 4 …

Read Story

YouTube Moves to Prohibit Hacking Videos

YouTube explicitly made a change to its Harmful and Dangerous Content policy by prohibiting videos that were instructional in nature that contained duplicating, accessing or exploiting data on websites. First Published 9th July 2019 | Latest Refresh 3rd September 2022 Is there a negat …

Read Story

Subscribe by email