Research / Infrastructure

The Evolving Arms Race of IT Security Countermeasures

Ask yourself - who really benefits from the arms race?

The attack technique appears to circumvent so-called ASLR protection mechanisms by triaging the exact memory location of a running process from differences in function response times.

Read Story

Why Internet Voting is Still Rare

With security becoming increasingly important in the digital realm, nations are starting to ask (again) if internet voting can be implemented successfully. But finding an answer first hasn't stopped some. First Published 27th May 2019 | Latest Refresh 3rd May 2022 Exercise your discre …

Read Story

Docomo E-Money: The Risk of Changing Parameters

The risk of changing a set of parameters is to assume that the attackers will not try to understand the method behind the change. The Docomo E-Money attack is an excellent example with obvious consequences. First Published 7th October 2020 Connecting the dots… securely. 4 min read | R …

Read Story

Twitter, 17-year-olds, and the difference between a hack and a cover-up

Graham was able to enter a hole in a website that should have been patched. Twitter’s architecture is based on open-source software which makes it easier to find bugs and then exploit them, to which he did exactly that. First Published 1st September 2020 Ask and you shall receive. 4 m …

Read Story

The Aftermath of the Twitter Hack

The hacker's actions are reminiscent of many other incidents involving social media sites and cryptocurrency, but for Twitter users, the reputational risks can be significant. First Published 30th July 2020 Scam at scale. 4 min read | Reflare Research Team As dozens of high-profile Tw …

Read Story

The Worst S3 Bucket Breach - So Far

Even though AWS provide their customers with sufficient security measures, some companies still fail to take security seriously by not correctly securing their Amazon S3 buckets. First Published 12th December 2019 Everything from A to Z? 4 min read | Reflare Research Team Various news …

Read Story

Voting Machines - Absolutely everything is a tradeoff decision

Voting Machines - Absolutely everything is a tradeoff decision

There is no such thing as pure security. You can only make tradeoff decisions, and in the case of voting machines, those decisions are made very, very publicly. The entire world can watch you make your tradeoffs, and they can ask you to defend those decisions later. First Published 8t …

Read Story

On Bad Solutions and Negative Returns

On Bad Solutions and Negative Returns

"If only. If only there were some sort of top-secret method of cyber security that hardened your network, protected your servers and applications, and did so in a way that was seamless, invisible, reliable, and not too terribly expensive." *cough* First Published 16th October 2019 Hyg …

Read Story

What Twitter's CEO's Own Account Getting Hacked Tells Us About Phone Security

Phone numbers are not secure, as Jack Dorsey has found out the hard way. Assailants were able to gain access to his phone number and then used that access remotely to take control of his Twitter account. First Published 4th September 2019 Jack lets everyone know "what's happening." 4 …

Read Story

Telegram Messenger Hit by DDoS Attack Originating from China

Telegram Messenger Hit by DDoS Attack Originating from China

The app’s co-founder Pavel Durov said that its “Telegram Messenger” service had been blocked in China following a massive distributed denial of service (DDoS) attack launched from there. First Published 17th June 2019 The role of digital messaging in moments of geopolitical upheaval c …

Read Story

Subscribe by email