Research / Infosec Culture (5)

YouTube Moves to Prohibit Hacking Videos

YouTube explicitly made a change to its Harmful and Dangerous Content policy by prohibiting videos that were instructional in nature that contained duplicating, accessing or exploiting data on websites. First Published 9th July 2019 | Latest Refresh 3rd September 2022 Is there a negat …

Read Story

Cybercrime in Space - Let's focus on what matters

Cybercrime in Space - Let's focus on what matters

NASA astronaut Anne McClain allegedly logged into her ex-wife's bank account and then deleted the transaction history, while aboard the ISS. If so, what are the implications of the first cybercrime in space? First Published 28th August 2019 In space, no one can hear you chuckle. 4 min …

Read Story

Talent Can't Keep Up with Security Demands

The recent high-profile mass hacks have brought the need for InfoSec talent to the forefront. However, it's proving difficult for companies to find the staff to keep up with their security requirements. First Published 16th July 2019 Tech talent burnout is real. So is the scarcity of …

Read Story

Can Security Be Forced Upon Companies?

In the wake of two high-profile data breaches, lawmakers are asking tough questions to company executives, which is forcing them to reevaluate how they store, transfer and protect client data. First Published 12th March 2019 Make me do it. 4 min read | Reflare Research Team This week …

Read Story

Australian Parties Hacked - Pass the Blame

Australia has been gripped by a series of cyber-attacks. As the accusations fly in light of the most recent breach, there is one blindingly obvious thing missing from the blame game - evidence. First Published 25th February 2019 Australia's new National Centre for Cyber Security. 4 mi …

Read Story

Uber Fined for 2016 Data-Breach

Uber Fined for 2016 Data-Breach

Uber was recently fined for failing to protect the data of 57 million users worldwide in 2016. This comes under the EU-wide GDPR 2018, which was adopted into law after a “one-year grace period”. First Published 30th November 2018 This wasn't the first time Uber had been found to have …

Read Story

Formalised Offensive Cyber Strategies

The US Department of Defense Cyber Strategy serves as DoD's next step toward re-engineering cyber operations to protect and defend its networks and systems. This is the first time the DoD has had a clear direction on how it will address its cyber needs. So tell me, where's your plan? …

Read Story

Audits, Attacks and False Positives

Audits, Attacks and False Positives

Recently, several security companies detected phishing pages using the name of a core DNC system. These pages attempted to trick users into providing their login credentials by spoofing the legitimate login page for a Democratic Congressional Campaign Committee (DCCC) application buil …

Read Story

The Difficulty of Profiling Hackers

The Difficulty of Profiling Hackers

The public image of any given group of people tends to be created by mass media. Whether it is a tribe of Amazonian warriors or a modern terrorist leader, mass culture will project its own image on them. Hackers are no different. First Published 20th August 2018 When kids get up to no …

Read Story

Ticketmaster Hack and Shifting the Blame

Ticketmaster UK has fallen victim to a security breach. The TLDR is pretty straightforward - but the detail is where things get interesting. Mainly because of how Ticketmaster is handling it, and how the banks and payment processors are reacting. First Published 29th June 2018 When yo …

Read Story

Subscribe by email