Blog Posts Tagged with "Elections"

37d5f81e2277051bc17116221040d51c

Cybersecurity Matters in The Election

November 05, 2012 Added by:Robert Siciliano

Whomever is elected president will face an unknown unseen digital enemy unlike any other president has seen in history. Think before you click. Know who’s on the other side of that instant message. What you say or do in cyberspace stays in cyberspace — for many to see, steal and use against you or your government...

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

Cyber Threats to Democracy?

October 18, 2012 Added by:Jayson Wylie

I highly encourage anyone to look into the current mechanisms which count the people’s vote state-by-state, but even more I encourage the security industry and public to voice outrage for not putting security first in our sacred democratic election process...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Four Horsemen of the Infosec Apocalypse and the Freak Power Ticket

September 18, 2012 Added by:Infosec Island Admin

All of this will be tempered by what happens next for Dave and Chris. Will they be able to penetrate the old boy network? Will they be able to, once ensconced in the ISC(2) inner sanctum, make any kinds of change that would make the CISSP more meaningful? Time will tell my friends...

Comments  (1)

32137b352537f11c1efe063869f00e0e

Four Days and Counting for (ISC)2 BoD Petitioners

September 13, 2012 Added by:Le Grecs

The same "good 'ol boys/girls" keep returning time and time again. When their terms are up, they "sit out a year" and then the next board nominates them as one of the BoD-recommended candidates. Keeping the same old board will result in a certification that continues to be disconnected...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Dominican Republic Central Electoral Board DDoS Attacks

May 30, 2012 Added by:Headlines

“Politically motivated DDoS attacks are increasingly common and are often timed to coincide with high profile events such as elections or executed in response to specific government actions. The key to minimizing disruption is being proactive and putting DDoS protection in place ahead of time...”

Comments  (0)

3750d420f6c2a9844b529978894dc0be

Data (In)Security Will Impact Presidential Election Race

May 01, 2012 Added by:Josh Shaul

Breaking into poorly protected government systems and revealing personal or financial information, stealing and posting lists of campaign donations, or corrupting electronic voting systems – these tactics are available to those with expertise and funding...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Experts Warn of Online Voting Security Issues

March 30, 2012 Added by:Headlines

“Election officials who run and pursue online voting programs must understand that they are putting voters’ ballots at risk of being altered or deleted without anyone realizing it,” said Susannah Goodman of the Election Verification Network...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Researchers Demonstrate Diebold Voting Machine Hack

September 30, 2011 Added by:Headlines

"These man-in-the-middle attacks are potentially possible on a wide variety of electronic voting machines. We think we can do similar things on pretty much every electronic voting machine. This is a national security issue. It should really be handled by the Department of Homeland Security..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Allegations of MitM Hack of 2004 Presidential Ohio Election

July 28, 2011 Added by:Headlines

"The architecture further confirms how this election was stolen. The computer system and SmarTech had the correct placement, connectivity, and computer experts necessary to change the election in any manner desired by the controllers of the SmarTech computers..."

Comments  (0)