The Evolving Arms Race of IT Security Countermeasures
by Reflare Research Team on Mar 3, 2023 5:25:00 PM
The attack technique appears to circumvent so-called ASLR protection mechanisms by triaging the exact memory location of a running process from differences in function response times.
Why Internet Voting is Still Rare
by Reflare Research Team on May 3, 2022 5:29:00 PM
With security becoming increasingly important in the digital realm, nations are starting to ask (again) if internet voting can be implemented successfully. But finding an answer first hasn't stopped some. First Published 27th May 2019 | Latest Refresh 3rd May 2022 Exercise your discre …
Docomo E-Money: The Risk of Changing Parameters
by Reflare Research Team on Oct 7, 2020 6:42:00 PM
The risk of changing a set of parameters is to assume that the attackers will not try to understand the method behind the change. The Docomo E-Money attack is an excellent example with obvious consequences. First Published 7th October 2020 Connecting the dots… securely. 4 min read | R …
Twitter, 17-year-olds, and the difference between a hack and a cover-up
by Reflare Research Team on Sep 1, 2020 6:40:00 PM
Graham was able to enter a hole in a website that should have been patched. Twitter’s architecture is based on open-source software which makes it easier to find bugs and then exploit them, to which he did exactly that. First Published 1st September 2020 Ask and you shall receive. 4 m …
The Aftermath of the Twitter Hack
by Reflare Research Team on Jul 30, 2020 6:38:00 PM
The hacker's actions are reminiscent of many other incidents involving social media sites and cryptocurrency, but for Twitter users, the reputational risks can be significant. First Published 30th July 2020 Scam at scale. 4 min read | Reflare Research Team As dozens of high-profile Tw …
The Worst S3 Bucket Breach - So Far
by Reflare Research Team on Dec 12, 2019 6:15:00 PM
Even though AWS provide their customers with sufficient security measures, some companies still fail to take security seriously by not correctly securing their Amazon S3 buckets. First Published 12th December 2019 Everything from A to Z? 4 min read | Reflare Research Team Various news …
Voting Machines - Absolutely everything is a tradeoff decision
by Reflare Research Team on Nov 8, 2019 6:10:00 PM
There is no such thing as pure security. You can only make tradeoff decisions, and in the case of voting machines, those decisions are made very, very publicly. The entire world can watch you make your tradeoffs, and they can ask you to defend those decisions later. First Published 8t …
On Bad Solutions and Negative Returns
by Reflare Research Team on Oct 16, 2019 6:04:00 PM
"If only. If only there were some sort of top-secret method of cyber security that hardened your network, protected your servers and applications, and did so in a way that was seamless, invisible, reliable, and not too terribly expensive." *cough* First Published 16th October 2019 Hyg …
What Twitter's CEO's Own Account Getting Hacked Tells Us About Phone Security
by Reflare Research Team on Sep 4, 2019 5:51:00 PM
Phone numbers are not secure, as Jack Dorsey has found out the hard way. Assailants were able to gain access to his phone number and then used that access remotely to take control of his Twitter account. First Published 4th September 2019 Jack lets everyone know "what's happening." 4 …
Telegram Messenger Hit by DDoS Attack Originating from China
by Reflare Research Team on Jun 17, 2019 5:34:00 PM
The app’s co-founder Pavel Durov said that its “Telegram Messenger” service had been blocked in China following a massive distributed denial of service (DDoS) attack launched from there. First Published 17th June 2019 The role of digital messaging in moments of geopolitical upheaval c …