Car Hacking, Foreign Hacking & Bitcoin
by Reflare Research Team on May 4, 2016 1:52:00 PM
While security experts argue if a man named Craig Wright is the one and only Satoshi Nakamoto, the US Supreme Court just gave the FBI permission to hack any computer they have a warrant for. First Published 4th May 2016 Satoshi Nakamoto? Craig Wright? This stock image model? 3 min rea …
Cyberattacks on the Developing World
by Reflare Research Team on Apr 27, 2016 1:49:00 PM
The Philippines has emerged as a new hot spot for cybercriminals. While it is considered the third most affected country in the world, Bangladesh claims the top spot, with attacks often bouncing between the two jurisdictions. First Published 27th April 2016 The cyber-sophistication le …
Phone Hacking
by Reflare Research Team on Apr 20, 2016 1:46:00 PM
SS7 has over 30 years of history, but the hacking demonstration opens a scary prospect for everyone. The researchers proved that the SS7 network can be easily abused in order to spy on people's phone conversations and track their location. First Published 20th April 2016 "You don't sa …
Pirates & Hackers
by Reflare Research Team on Apr 13, 2016 1:44:00 PM
Shipping companies now claim that hackers are able to monitor the stock control, ship schedules, and routes of ships, allowing the pirates to track their targets, identify specific cargo, and execute physical attacks with new levels of speed and efficiency. First Published 13th April …
Hack the Pentagon
by Reflare Research Team on Apr 6, 2016 1:40:00 PM
The Hack the Pentagon program is meant to encourage security researchers to find weaknesses in their systems. This initiative will offer participants financial rewards in place of legal punishment for participating in the program. First Published 6th April 2016 The US Department of De …
Brussels, Crypto, Privacy & Security
by Reflare Research Team on Mar 30, 2016 1:37:00 PM
The debate about internet privacy and the role of cryptography in protecting our communications has been raging for years. However, cryptography is only one step in a long chain of security measures meant to protect data from unauthorised access. First Published 30th March 2016 | Late …
Celebrity Hacks & Encryption Policy
by Reflare Research Team on Mar 23, 2016 12:33:00 PM
There is an increase in hacking into celebrity accounts to steal photos, financial data and medical records. But you would think high-profile public individuals would have more secure data protection measures in place, right? First Published 23rd March 2016 For some reason, celebritie …
Ransomware & Soft Targets
by Reflare Research Team on Mar 16, 2016 12:28:00 PM
Ransomware is becoming a huge problem, and Healthcare providers are being targeted more than other industries because they are generally viewed by criminals as soft targets with a proven ability to pay up. First Published 16th March 2016 Hospitals are seen as targets that have a highe …
Mac Ransomware
by Reflare Research Team on Mar 9, 2016 9:36:00 AM
Considering the highly developed nature of Mac OS and its users’ tendencies when updating, it is not surprising that malware attacks are usually less frequent than for other platforms. But that doesn‘t mean that this type of attack doesn’t happen. First Published 9th March 2016 Ransom …
Apple's Privacy & Ukraine Hack
by Reflare Research Team on Mar 2, 2016 9:32:00 AM
If you’ve noticed, there seems to be a growing global conversation about privacy. One of the things that is getting much attention is the standoff between Apple and the federal government regarding iPhone security. First Published 2nd March 2016 "The FBI is creating a world where citi …