Research

The Iowa Primary from an Information Security Perspective

The app suffered a significant hack that compromised the integrity of the vote and threatened to invalidate the results completely. The app developers are now suggesting "a firewall issue", which had nothing to do with their code, is to blame. First Published 10th February 2020 Actual …

Read Story

The Inevitability of 'Shlayer'

There seems to be a perception by many Apple users that Macs are somehow immune to infection with malware. Unfortunately, Shlayer is an example of just how wrong that idea is. First Published 31st January 2020 macOS in the spotlight. 4 min read | Reflare Research Team We have repeated …

Read Story

I'm Afraid You Have 'State Actor'

When it comes to cyberattacks, the threat of a nation-state adversary infiltrating your network is among the most serious threats you can face. But just how frequently does this actually happen? First Published 17th January 2020 Just because you feel it doesn't mean they are there. 4 …

Read Story

The Changing Meaning of 'A Hack'

The Changing Meaning of 'A Hack'

For decades, the term “hack” was used to denote a clever (often functional) solution to a problem. However, "hack" has since evolved into meaning something very different. First Published 8th January 2020 When it comes to being hacked, words matter. 4 min read | Reflare Research Team …

Read Story

The Worst S3 Bucket Breach - So Far

Even though AWS provide their customers with sufficient security measures, some companies still fail to take security seriously by not correctly securing their Amazon S3 buckets. First Published 12th December 2019 Everything from A to Z? 4 min read | Reflare Research Team Various news …

Read Story

The Commoditisation of Hacking

The commoditisation of hacking tools, materials, and services is an uncomfortable trend that is slowly becoming visible as more hackers work together to share information on how to exploit vulnerabilities. First Published 21st November 2019 It's just like selling shovels in a gold rus …

Read Story

Voting Machines - Absolutely everything is a tradeoff decision

Voting Machines - Absolutely everything is a tradeoff decision

There is no such thing as pure security. You can only make tradeoff decisions, and in the case of voting machines, those decisions are made very, very publicly. The entire world can watch you make your tradeoffs, and they can ask you to defend those decisions later. First Published 8t …

Read Story

Putting Breach Awareness into a Historical Context

Putting Breach Awareness into a Historical Context

How is the world of data breach awareness changing? Is there a shift from protecting companies to protecting individuals? And if so, where does all this awareness lead us to in contrast to where we've been? First Published 30th October 2019 There is a lot we can learn about the future …

Read Story

On Bad Solutions and Negative Returns

On Bad Solutions and Negative Returns

"If only. If only there were some sort of top-secret method of cyber security that hardened your network, protected your servers and applications, and did so in a way that was seamless, invisible, reliable, and not too terribly expensive." *cough* First Published 16th October 2019 Hyg …

Read Story

The Dual Nature of Jailbreaks

Some are frustrated by imposed restrictions and would like to move their device away from its “stock” settings. However, jailbreaking allows users to do many things that most of the general public might not realise is possible. First Published 2nd October 2019 I want to break freeee. …

Read Story

Subscribe by email