Research / Infosec Culture (6)

Smartlocks and the Challenges of Specialisation

Smartlocks and the Challenges of Specialisation

These smartlocks have stirred up much conversation in the security community. While some people are pretty happy with the implementation, others feel that they shouldn’t be depended on. First Published 22nd June 2018 The key to happiness is not in the lock. 4 min read | Reflare Resear …

Read Story

The European Commission's Exemption from GDPR

The European Commission's Exemption from GDPR

A week after the EU’s new General Data Protection Regulation (GDPR) went into force, the European Commission seems to have dumped over a million visitors’ personal data on Google – without being compliant with GDPR. First Published 15th June 2018 General Data Protection Regulations fo …

Read Story

The Challenges of Acquiring and Retaining Information Security Staff

Employers need to recognise that hiring people with a single skill set into an infosec role will only work for a short time frame before there is either burnout, or the person you hired realises that this job doesn’t match their interests and aspirations. First Published 1st June 2018 …

Read Story

US-CERT Releases Alert on Russian Activity

US-CERT Releases Alert on Russian Activity

A DHS and FBI joint technical alert describes cyber-enabled capabilities and actions related to the Russian Government compromising US-based networks and endpoints, as well as distributing malware, conducting spear phishing operations, and deploying network reconnaissance tools. First …

Read Story

10% of ICO Funding Stolen by Hackers

10% of ICO Funding Stolen by Hackers

The question of investor protection and the lack of a safety net for contributors was recently brought to light when hackers managed to steal more than 10% of the Ether created in a crowd sale. First Published 26th January 2018 Investment Banker? Hacker? When it comes to going public, …

Read Story

Uber - On Paying Ransoms

Third-party cloud-based services are like a box of chocolates - you often don't know what you’re going to get. They could work perfectly, but they could also put you in a very uncomfortable position. First Published 24th November 2017 Uber, showing its hand. 4 min read | Reflare Resea …

Read Story

Checking Boxes vs. Proactive Security

Checking Boxes vs. Proactive Security

While it is true that new vulnerabilities receive the most media attention, these issues are quite rare compared to well-known vulnerabilities. So, are our leaders focused on the security risks that actually matter? First Published 27th October 2017 Hey everybody - we are now 100% sec …

Read Story

North Korea and the Asymmetric Power of Hacking

North Korea and the Asymmetric Power of Hacking

Pyongyang is believed to have stolen 235 gigabytes of confidential information from South Korea's military network, which purports to include information about the plan for retaking North Korea in the case of unification. First Published 13th October 2017 Truman left many things in So …

Read Story

More Testimony and Still No Details in Russian US Election Hacking Allegations

More Testimony and Still No Details in Russian US Election Hacking Allegations

Mr. Liles did not attribute the attack to any specific country, but told the Senate Intelligence Committee during his testimony that there are only a select few who had the capability to carry out this kind of attack. The media then filled in the gaps. First Published 23rd June 2017 S …

Read Story

North Korea & Why Small States Have Big Cyber Capabilities

North Korea & Why Small States Have Big Cyber Capabilities

Pyongyang’s cyber playbook includes denial of service attacks, infiltrating systems and extracting data, DDOS attacks against websites and potentially destructive computer worm capabilities. First Published 16th June 2017 "We might be hungry, but we'll see you at Black Hat." 4 min rea …

Read Story

Subscribe by email