Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Share Post: Reddit Facebook
Vulnerabilities discovered in electoral counting machines in 23 states
#1
https://blog.360totalsecurity.com/en/vul...e=Mainpage      Vulnerabilities discovered in electoral counting machines in 23 states
Oct 8, 2018 Elley    Security researchers have found that there are 11 years of unpatched security vulnerabilities in the counting machines used in 23 states, making the counting machines vulnerable to hackers.

The M650 high-speed ballot scanner is manufactured by Election Systems & Software (ES&S), the leading electoral equipment supplier in the United States. A technical report pointed out that the vulnerability is the most serious vulnerability in voting equipment.

When talking about the M650, Jake Braun, one of the cybersecurity experts and organizers at the University of Chicago, said: “If someone exploits a vulnerability to crack a password and tries to adjust the number of votes, it may change the count of the entire county/state vote. The opinion of another organizer and researcher is that an infected disk can take over the entire electoral system.

Broun said that ES&S continues to support and serve the M650, which reflects the current state of the national voting equipment industry that many problematic ticket holders are still on the job.

Cybersecurity experts have long been concerned that the country’s outdated electoral infrastructure is vulnerable to attack, and this is an important factor in Russia’s ability to influence elections in 2016.

A report from the National Academy of Sciences in September urged that the electoral facilities need to implement the necessary reforms by 2020, including ongoing federal funding, because the elections are governed by states and related security measures are slow to change. Other recommendations include the lack of “human-readable” paper records for retired electronic machines and the need for reliable post-election review. The Republican Party’s leadership in Congress has recently hampered the process of adopting electoral reform legislation.

The researchers’ safety testing process was also in a slump, they received more than 30 voting devices and other machines for security testing, but they could test very limited content because the vendor refused to provide proprietary equipment. Policymakers at the National Security Agency and the Department of Homeland Security believe that the best way to ensure that equipment is elected is to have no hostile technicians attack it, but ES&S has rejected the proposal, and the current environmental exposure-specific technology will instead allow the election to be elected. Rebutted.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Google sued by DC and three states for ‘deceptive’ Android location tracking mrtrout 0 936 01-24-2022 , 11:34 PM
Last Post: mrtrout
  Password-Stealing Windows Malware has been Discovered mrtrout 0 931 07-24-2021 , 02:32 AM
Last Post: mrtrout
  FTC joins 38 states in takedown of massive charity robocall operation Bjyda 0 1,695 03-05-2021 , 09:32 PM
Last Post: Bjyda
  TIM’s Red Team Research (RTR) discovered a critical zero-day vulnerability in IBM Inf Bjyda 0 2,350 02-13-2021 , 10:07 PM
Last Post: Bjyda
  Secret backdoor discovered in Zyxel firewall and AP controllers mrtrout 1 1,168 01-03-2021 , 05:18 PM
Last Post: Mike



Users browsing this thread: 1 Guest(s)