Research

The Difficulty of Profiling Hackers

The Difficulty of Profiling Hackers

The public image of any given group of people tends to be created by mass media. Whether it is a tribe of Amazonian warriors or a modern terrorist leader, mass culture will project its own image on them. Hackers are no different. First Published 20th August 2018 When kids get up to no …

Read Story

Reddit's Hack & The Risks of Phone-Based 2-Factor Authentication

Reddit's Hack & The Risks of Phone-Based 2-Factor Authentication

While it is clear that the 2FA implementation was not at fault here, there are significant risks associated with phone based 2FA that warrant serious consideration before you make this type of authentication method available to users. First Published 6th August 2018 r/LetsHackReddit 4 …

Read Story

Dealing with the Increasingly Severe Cyber-Threat Landscape

Dealing with the Increasingly Severe Cyber-Threat Landscape

The severity of cyber attacks has increased at a rapid pace over the past several years. No longer is it just large companies that need to secure themselves from malicious actors; individual users now must consider how they can protect themselves too. First Published 27th July 2018 Th …

Read Story

How Attacks are Escalated

An attack takes place and either succeeds or fails. The reality however is more complicated. Attackers are often able to initially gain a minor foothold in the target and then over time leverage it into a more devastating attack. First Published 20th July 2018 Вверх, вверх, вверх! 3 m …

Read Story

An Update to the Ticketmaster Breach

The malicious script was inserted into the Ticketmaster website via a third-party chat widget called Chatters City created by software developer Inbenta Technologies. First Published 13th July 2018 "Buy the ticket. Take the ride." - Hunter S. Thompson. 4 min read | Reflare Research Te …

Read Story

How Malware Infections Happen

Common malware is a generic threat, when successful, can infect thousands, if not millions of users. But targeted malware attacks are much more sophisticated and resilient to antivirus scanners. First Published 6th July 2018 All your data are belong to us. 4 min read | Reflare Researc …

Read Story

Ticketmaster Hack and Shifting the Blame

Ticketmaster UK has fallen victim to a security breach. The TLDR is pretty straightforward - but the detail is where things get interesting. Mainly because of how Ticketmaster is handling it, and how the banks and payment processors are reacting. First Published 29th June 2018 When yo …

Read Story

Smartlocks and the Challenges of Specialisation

Smartlocks and the Challenges of Specialisation

These smartlocks have stirred up much conversation in the security community. While some people are pretty happy with the implementation, others feel that they shouldn’t be depended on. First Published 22nd June 2018 The key to happiness is not in the lock. 4 min read | Reflare Resear …

Read Story

The European Commission's Exemption from GDPR

The European Commission's Exemption from GDPR

A week after the EU’s new General Data Protection Regulation (GDPR) went into force, the European Commission seems to have dumped over a million visitors’ personal data on Google – without being compliant with GDPR. First Published 15th June 2018 General Data Protection Regulations fo …

Read Story

The Challenges of Acquiring and Retaining Information Security Staff

Employers need to recognise that hiring people with a single skill set into an infosec role will only work for a short time frame before there is either burnout, or the person you hired realises that this job doesn’t match their interests and aspirations. First Published 1st June 2018 …

Read Story

Subscribe by email