Research / Infosec Culture (8)

US Election Hacking Allegations

Several news outlets reported earlier this week that a “team of prominent computer scientists” had uncovered “persuasive evidence” that the recent US federal election had been hacked. Hmmm. First Published 24th November 2016 Be cautious of those who use 'cybersecurity hearsay' to chal …

Read Story

Three Kinds of Governmental Hacking

For one, private email accounts provide global government agencies with a means to conduct surveillance without leaving behind an official paper trail. Ask Hillary. First Published 12th October 2016 Rage against the machine, three ways. 4 min read | Reflare Research Team In this brief …

Read Story

Medical Devices and Security Issues

Medical Devices and Security Issues

Medical devices have a unique straddle over both the physical and digital world. However, they are often susceptible to cyber attacks as they allow wireless communication between electronic devices. First Published 5th October 2016 There are risks with body parts that have a mind of t …

Read Story

Probing the Internet's Backbone

Probing the Internet's Backbone

To understand how disruption could lead to a failure of internet services, one only needs to understand the concept of DNS (Domain Name System), which is the plumbing behind the internet that translates human-readable domain names with IP addresses. First Published 21st September 2016 …

Read Story

Olympic Hacking

The Olympic Games are not usually an occasion for espionage and cyber attack. However, the attack on the World Anti-Doping Agency (WADA) showed what a dedicated adversary could do with the massive amounts of data they obtained from such an event. First Published 14th September 2016 Ci …

Read Story

US Hacking Investigations & UK Password Leaks

US Hacking Investigations & UK Password Leaks

Malicious actors do not need to be skilled in hacking techniques anymore. They can simply analyse unknowingly leaked information from the victim's Twitter account. Not optimal. First Published 7th September 2016 If you really must tweet a pic of your office whiteboard, please make sur …

Read Story

The US Response to Cyber Attacks

There has been a rapidly increasing number of accusations directed against foreign governments undertaking malicious activity focused on political parties, candidates, government agencies, the media and government infrastructure. First Published 31st August 2016 Cyber is increasingly …

Read Story

NSA Hack Update & Attacks on New York Times

NSA Hack Update & Attacks on New York Times

Cyber attacks on newspapers and other journalistic outlets are some of the most dangerous attacks possible, as they have the potential to impact an entire nation’s public opinion just as much as any government document or military secret. First Published 24th August 2016 All the news …

Read Story

NSA Toolkit Leak

NSA Toolkit Leak

A group calling itself "The Shadow Broker" released a set of internal NSA files allegedly from the Tailored Access Operations (TAO) team, including several descriptions of 0-day exploit chains and tools. First Published 17th August 2016 "I know your every secret, while you fumble in t …

Read Story

Oracle MICRO PoS System Hacked

Oracle MICRO PoS System Hacked

Think about it: you’re a bank—one who also happens to be a MICROS customer—and you need some help with a merchant terminal that just so happens to be running MICROS software. You go to their site for support and, voila. Malware!! First Published 10th August 2016 PoS is an acronym for …

Read Story

Subscribe by email