Research / Infrastructure (2)

Washington State Passes New Data Breach Legislation

Washington State Passes New Data Breach Legislation

The North-West US state of Washington passed new legislation that substantially tightens the notification requirements for breaches within it. The question now is - who will follow suit? First Published 30th April 2019 Get ready to report those breaches! 4 min read | Reflare Research …

Read Story

Japan Intends to Preventively Hack Citizens' IoT Devices

The Japanese government is considering a proposal from the country’s leading IT firms to hack citizens’ IoT devices to improve the nation’s cyber-security. However, Japanese citizens have a constitutional right to privacy. First Published 1st February 2019 "Hi. I'm from the government …

Read Story

Global 4G Outages Caused by Ericsson Backend

Users across the world almost simultaneously started receiving messages that they had trouble connecting to mobile networks on their phones, proving that even the largest carriers are still susceptible to failures in their core network. First Published 7th December 2018 Ring ring? 4 m …

Read Story

MiSafe Child Tracking Watches and the Paradox of Buying Security

Child care and security is big business. With a global market value of $23bn, the child monitoring systems industry is going nowhere but up. However, software vulnerabilities that could be exploited bring the whole proposition into question. First Published 16th November 2018 There is …

Read Story

The Risk of Hardware Backdoors

If the Bloomberg report is true, this means that American companies aren’t the only victims of hardware tampering. This is a real threat that’s been growing for years, and multinational companies are at risk. First Published 8th October 2018 These aren't the droids you're looking for. …

Read Story

On the Grey Zones of Privacy

On the Grey Zones of Privacy

Facebook apps operate on the principle that you explicitly agree to each access requested. The app requests certain permissions, and you then consent to the information exchange. But what happens when consent reaches into the details of your contacts? First Published 23rd March 2018 E …

Read Story

Coincheck and Half a Billion Dollars

Coincheck and Half a Billion Dollars

Imagine waking up one morning to find out hackers stole roughly 500 million USD from your company's crypto exchange. Now, imagine your customers begging for it back. First Published 2nd February 2018 More and more, victims of cryptocurrency theft are turning to god. 4 min read | Refla …

Read Story

Heavy Industry and Information Security

Heavy Industry and Information Security

While attacks against management or staff systems related to industrial targets are common, attacks against actual plant infrastructure are comparatively rare. First Published 19th January 2018 Critical infrastructure is still a desirable target. 4 min read | Reflare Research Team Whi …

Read Story

DHS Hacks One of its Airplanes

During a speech at the CyberSat Summit, Pam Dixon, the Director of DC3, revealed that while it was possible for other malicious hackers to remotely hijack connected electronic devices on commercial aeroplanes. First Published 17th November 2017 Hack your own equipment. 3 min read | Re …

Read Story

The Safety of Nuclear Submarines

The Royal Navy has four submarines capable of launching the UK’s Nuclear Deterrent. It's believed some of them run Windows XP. Yeah... nuclear submarines... on XP. First Published 2nd June 2017 Having difficulties with your sub? Just Control+Alt+Delete. 4 min read | Reflare Research T …

Read Story

Subscribe by email