Research / Normal People and Infosec (3)

The Dual Nature of Jailbreaks

Some are frustrated by imposed restrictions and would like to move their device away from its “stock” settings. However, jailbreaking allows users to do many things that most of the general public might not realise is possible. First Published 2nd October 2019 I want to break freeee. …

Read Story

China, Uyghur Smartphones and the Power of State Actors

Surveillance malware is commonly used to track a target’s messages, conversations and location, and this is not the first time that such technology has been used by a country against its own people. First Published 10th September 2019 The role of cyber security in global geopolitics w …

Read Story

What is Privacy, Really?

Privacy — or lack thereof — is a constant concern for many people. Is it such a big deal if some of my personal data is collected by an app developer? Maybe. But what if that app developer then went on to sell my biometric data to a government? First Published 23rd July 2019 Are we al …

Read Story

Australia, Cryptography and the Dangers of Analogies

The new law is a sizeable step forward for the Australian government on its long-standing quest to undermine encryption, forcing individuals and organisations into weakening their systems to comply. First Published 14th December 2018 The world is watching Australia closely. 4 min read …

Read Story

An Update on the British Airways Breach and the Difficulty of Estimating Breach Numbers

An Update on the British Airways Breach and the Difficulty of Estimating Breach Numbers

“How many people were affected by the British Airways data breach?” That has been the million-dollar question for some time, but providing decent estimates in moments of crisis is hard. First Published 2nd November 2018 BA addresses the fallout. 4 min read | Reflare Research Team A st …

Read Story

Cathay Pacific and Reading Between the Lines of Breach Reports

Cathay Pacific Airways, a Hong Kong-based airline revealed that it was recently the victim of a cyber-attack that exposed the personal data of its users. "What are the details" you ask? Well, that's an interesting question. First Published 26th October 2018 Airlines are clearly a popu …

Read Story

Old Attackers, New Targets - The British Airways Breach

The site was extremely well designed and did not feel at all ‘spammy’ to use – indeed, on the surface it felt reassuringly professional, with a slick revolving banner of destinations. It just clearly wasn't British Airways. First Published 14th September 2018 The world's favourite air …

Read Story

Attack Realities - Browser Plugins and Risk

Attack Realities - Browser Plugins and Risk

The MEGA Chrome extension for file hosting included JavaScript code designed to monitor web traffic in order to steal the user’s login credentials from a large selection of sites. First Published 7th September 2018 Guilty by extension. 3 min read | Reflare Research Team On September 4 …

Read Story

How Malware Infections Happen

Common malware is a generic threat, when successful, can infect thousands, if not millions of users. But targeted malware attacks are much more sophisticated and resilient to antivirus scanners. First Published 6th July 2018 All your data are belong to us. 4 min read | Reflare Researc …

Read Story

Securus, Tracking and Why Information Companies Don't Necessarily Understand Information Security

Securus, Tracking and Why Information Companies Don't Necessarily Understand Information Security

Suppose a company hired to focus on monitoring calls from inmates (and only inmates) is selling the location data of regular citizens to law enforcement as well. Doesn't this company seem like the last place you'd trust your personal or business security? First Published 18th May 2018 …

Read Story

Subscribe by email