Thinking of Cybersecurity in Relative Terms
by Reflare Research Team on Feb 8, 2022 6:01:00 PM
There is an enormous disconnect between industry experts, reporters and users when discussing cybersecurity incidents and risks. This leaves a chasm of misunderstanding regarding the severity and scope of what is possible. First Published 9th October 2019 | Latest Refresh 8th February …
The Logic Behind Suing Hackers
by Reflare Research Team on Jan 23, 2022 6:36:00 PM
Microsoft successfully sued a network of Russian “Fancy Bear” (APT28) hackers, which has been blamed for many cyber attacks, including the DNC hack in 2016. Wait... is Microsoft actually suing hackers?!? First Published 25th August 2017 | Latest Refresh 23rd January 2022 Microsoft get …
How to Ask for Honest User Feedback on Your IT Security Training Program
by Reflare Research Team on Dec 22, 2021 7:07:00 PM
Both tech and non-tech staff understand how important IT security is, and they will happily tell you what they think of your training initiatives if you ask them. Are you ready to hear it? And even if you are, what are you going to do next?
The Changing Image of Cyber Warfare
by Reflare Research Team on Dec 1, 2021 5:36:00 PM
The evolution of cyber attacks has raised the profile of cyber warfare. For example, one cyber attack against state-owned Saudi Aramco almost destroyed the company’s entire computer system. The attack was rated as being capable of causing $150 billion in damage, which would rank it eq …
Pegasus and the Digital Arms Trade
by Reflare Research Team on Nov 30, 2021 7:15:00 PM
A high-profile divorce case has shown that the elite can indeed deploy government-level espionage spyware tools for their own personal use, and it's more common than you think. So, how did we get here?
Electoral Interference, Restrictions and Anonymity
by Reflare Research Team on Oct 19, 2021 12:22:00 PM
The lack of international consensus on what exactly the Restrictive Internet Censorship and Freedom of Information laws should not have created a high-stakes game of political 'cat and mouse'. First Published 19th October 2016 Someone might be without their 'How to Frontside Smith Gri …
Mobile App Hype and Criminal Activity
by Reflare Research Team on Sep 13, 2021 2:48:00 PM
While Pokemon Go promised to bring in more players, hackers counted on the excitement generated by the launch to spread malware among users until the location services were fully available worldwide. First Published 13th July 2016 | Latest Refresh 13th September 2021 I choose you, vag …
A Post-Hack Crisis, Escalation of Rhetoric and Where to Place Blame
by Reflare Research Team on May 8, 2021 7:03:00 PM
Widespread accusations towards the Russian government services and the apparent lack of a “smoking gun” after the 2016 US election raises the question of whether the United States brought on a second post-hack crisis of their own creation.
When Securing Your Company Data, Please Remember the Promiscuous
by Reflare Research Team on May 5, 2021 6:46:00 PM
Security is never stagnant. At best, it’s a game of cat and mouse where you try to outsmart the other party — with new security threats arising when you least expect them. However, there are some valuable lessons from the past that many have yet to learn.
Government Eavesdropping and Onsite Backdoors
by Reflare Research Team on May 4, 2021 5:27:00 PM
In the name of ‘national security’, there continues to be repeated calls for tech organisations to build backdoors into their systems to enable government access. The overarching concern is that corporations use of backdoors will undermine and weaken encryption methods, and there are …