Research

Medical Devices and Security Issues

Medical Devices and Security Issues

Medical devices have a unique straddle over both the physical and digital world. However, they are often susceptible to cyber attacks as they allow wireless communication between electronic devices. First Published 5th October 2016 There are risks with body parts that have a mind of t …

Read Story

Cyber Security in the Mainstream

There was a time when cyber security was just another IT service. Then, everything changed; media, governments and broader society finally realised what had been going on behind their backs for years - "Cyber Attacks" were indeed "the next big thing", and they needed to be prepared fo …

Read Story

Probing the Internet's Backbone

Probing the Internet's Backbone

To understand how disruption could lead to a failure of internet services, one only needs to understand the concept of DNS (Domain Name System), which is the plumbing behind the internet that translates human-readable domain names with IP addresses. First Published 21st September 2016 …

Read Story

Olympic Hacking

The Olympic Games are not usually an occasion for espionage and cyber attack. However, the attack on the World Anti-Doping Agency (WADA) showed what a dedicated adversary could do with the massive amounts of data they obtained from such an event. First Published 14th September 2016 Ci …

Read Story

US Hacking Investigations & UK Password Leaks

US Hacking Investigations & UK Password Leaks

Malicious actors do not need to be skilled in hacking techniques anymore. They can simply analyse unknowingly leaked information from the victim's Twitter account. Not optimal. First Published 7th September 2016 If you really must tweet a pic of your office whiteboard, please make sur …

Read Story

The US Response to Cyber Attacks

There has been a rapidly increasing number of accusations directed against foreign governments undertaking malicious activity focused on political parties, candidates, government agencies, the media and government infrastructure. First Published 31st August 2016 Cyber is increasingly …

Read Story

NSA Hack Update & Attacks on New York Times

NSA Hack Update & Attacks on New York Times

Cyber attacks on newspapers and other journalistic outlets are some of the most dangerous attacks possible, as they have the potential to impact an entire nation’s public opinion just as much as any government document or military secret. First Published 24th August 2016 All the news …

Read Story

NSA Toolkit Leak

NSA Toolkit Leak

A group calling itself "The Shadow Broker" released a set of internal NSA files allegedly from the Tailored Access Operations (TAO) team, including several descriptions of 0-day exploit chains and tools. First Published 17th August 2016 "I know your every secret, while you fumble in t …

Read Story

Oracle MICRO PoS System Hacked

Oracle MICRO PoS System Hacked

Think about it: you’re a bank—one who also happens to be a MICROS customer—and you need some help with a merchant terminal that just so happens to be running MICROS software. You go to their site for support and, voila. Malware!! First Published 10th August 2016 PoS is an acronym for …

Read Story

Governments, Politics & Cyber Warfare - Part 2

Governments, Politics & Cyber Warfare - Part 2

The DNC hack has created a tense political climate, not only bringing both presidential candidates to their feet on numerous occasions but also raising many questions regarding cyber warfare. First Published 3rd August 2016 "Oh, say can't you seeee..." 4 min read | Reflare Research Te …

Read Story

Subscribe by email