Machines

now browsing by tag

 
 

Hackers to #Help Make #Voting #Machines Safe Again

Source: National Cyber Security – Produced By Gregory Evans

Following the recent declaration by the U.S. National Security Agency that Russian hackers tried to infiltrate the electronic voting machines used in the last U.S. presidential election, many people are calling for a lot of things especially for the electronic voting machines to be scrapped. Although the Russians did not succeed, more questions are still left on the table.

Bipartisan bill to secure voting machines

U.S. senators looking for answers have constituted a committee and is hoping to pass a bipartisan bill called the Securing America’s Voting Equipment (SAVE) Act. The bill will enlist help from the Department of Homeland Security to organize an event like the one held at the DEFCON hackers conference in July, themed the “Voting Machine Hacking Village.”

That DEFCON event exposed vulnerabilities in the electronic voting machines used in the last U.S. election. Hackers took less than two hours to break into the 25 voting machines that were brought to the DEFCON conference, and the first machine was penetrated in minutes. The results of the findings released at an event at the Atlantic Council in October was one of the key provocations for the US senators to introduce the SAVE bill.

Interestingly, some of the significant findings after the alleged Russian breach were centered on the use of foreign materials in the production of these voting machines. Hackers at the DEFCON event pointed to the possibility of having malware embedded into the hardware and software along the entire supply and distribution chain. It was also believed that hackers could have tampered with voters’ registration on the touch screen voting machines.

Hackers enlisted to hunt for vulnerabilities in voting machines

Called the “Cooperative Hack the Election Program”, the initiative mirrors the bug bounty programs previously ran by the U.S. Department of Defense (DoD) where friendly hackers were invited to hack the Pentagon, Army and Air Force. The program is set to swing into motion one year after the bill is in play.

The stated objective of the program is “to strengthen electoral systems from outside interference by encouraging entrants to work cooperatively with election system vendors to penetrate inactive voting and voter registration systems to discover vulnerabilities of, and develop defenses for, such systems.”

Just like past U.S. DoD programs, the “Hack the Election” competition will offer incentives for hackers to find security weakness in the election system. Hackers playing by the rules will also be waived from the Computer Fraud and Abuse Act (CFAA) and the Digital Millennium Copyright Act (DMCA).

Hackers to replicate past successes against voting machines

Looking at past results, we can expect excellent outcomes for the new program. The first of these bug bounties was the ‘Hack the Pentagon’ program where hackers found 138 vulnerabilities. This was quickly followed by the ‘Hack the Army’ program which yielded 118 vulnerabilities and ‘Hack the Air Force’ program with a bountiful harvest of 207 vulnerabilities.

While it is not clear if the hacking program is a one-off event, the bill does propose a requirement for integrity audits to be performed every four years on the voting machines starting from 2019. There is also the provision for grants to be given to help states enhance the security of their voting systems.

The post Hackers to #Help Make #Voting #Machines Safe Again appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Voting machines can be hacked without a trace of evidence

Voting machines can be hacked without a trace of evidenceSource: National Cyber Security – Produced By Gregory Evans The country’s voting machines are susceptible to hacking, which could be done in a way so that it leaves no fingerprints, making it impossible to know whether the outcome was changed, computer experts told President Trump’s voter integrity commission Tuesday. The testimony marked a departure for […] View full post on AmIHackerProof.com | Can You Be Hacked?

Police: N. Korean Malware Used in Hacking Attack on S. Korean ATM Machines

Source: National Cyber Security – Produced By Gregory Evans

Police suspect that North Korea is behind the leak of financial transactions data which resulted from the hacking of dozens of ATM machines in subway stations and convenience stores earlier in March. The National Police Agency’s Cyber Bureau announced on Wednesday that its investigation so far has found that a…

The post Police: N. Korean Malware Used in Hacking Attack on S. Korean ATM Machines appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Siemens to update medical scanner software amid Homeland Security warning machines could be hacked

Source: National Cyber Security – Produced By Gregory Evans

German industrial group Siemens expects to update software in some of its medical scanners by the end of the month to deal with vulnerabilities that could, in theory, allow some of this equipment to be hacked, a company spokesman said on Monday. Last week, the U.S. Department of Homeland Security…

The post Siemens to update medical scanner software amid Homeland Security warning machines could be hacked appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Computer expert: Some voting machines can be directly hacked

Source: National Cyber Security – Produced By Gregory Evans

Computer expert: Some voting machines can be directly hacked

A computer science professor told the Senate Intelligence Committee Wednesday that voting machines that create an electronic record of the voters’ decisions are open to fraud and computer hacking, vulnerabilities that are big enough to potentially change the outcome of some elections. J. Alex Halderman, professor of computer science at…

The post Computer expert: Some voting machines can be directly hacked appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Smart machines v hackers: How cyber warfare is escalating

Source: National Cyber Security – Produced By Gregory Evans There is a gaping hole in the digital defences that companies use to keep out cyber thieves. The hole is the global shortage of skilled staff that keeps security hardware running, analyses threats and kicks out intruders. Currently, the global … The post Smart machines v […]

The post Smart machines v hackers: How cyber warfare is escalating appeared first on AmIHackerProof.com.

View full post on AmIHackerProof.com | Can You Be Hacked?

Before machines the only form….

Before machines the only form of entertainment people really had was relationships. Douglas Coupland Read More….

The post Before machines the only form…. appeared first on Dating Scams 101.

View full post on Dating Scams 101

Arab hactivist use remote access Trojan to hack 24,000 machines worldwide

Symantec threat lab researchers say Arab Hackers based in Middle East are targeting the computers world wide using remote access Trojan njRAT. There are 487 groups involved in certain hacking campaign. 

Symantec says, “Symantec has identified 487 groups of attackers mounting attacks using njRAT. These attacks appear to have different motivations, which can be broadly classed as hacktivism, information theft and botnet building,” njRAT is a fairly simple malware widely available in Black Markets. 

The malware grants hackers basic powers, such as the ability to download and execute additional malware on infected systems, execute shell commands, read and write registry keys, capture screenshots, log keystrokes and hijack control of webcams. 

Researchers say these attacks originate from Middle East and nearly 80% of CnC base located in Egypt, Palestine and Lebiya.

Source: http://whogothack.blogspot.co.uk/2014/04/arab-hactivist-use-remote-access-trojan.html#.Vm8221V97IU

The post Arab hactivist use remote access Trojan to hack 24,000 machines worldwide appeared first on Am I Hacker Proof.

View full post on Am I Hacker Proof

4 ATM / Money Coin Machines on GovLiquidation.com – Missing Computer AlertMissing Computer Alert

missingcomputeralert.com – http://www.GovLiquidation.com – These 4 ATM / Money Coin Machines have been sold. These Machines were located in Lincoln, NE. There are 3 ATM’s and 1 Coin Co…

View full post on Hi-Tech Crime Solutions Weekly

TSA Machines are Vulnerable to Hacking Tricks

TSA Machines are Vulnerable to Hacking Tricks

You’ve probably heard about the Internet of Things: the idea that everything you own is going to be online. Your fridge will be able to talk to your car will be able to talk to your pacemaker. You also may […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post TSA Machines are Vulnerable to Hacking Tricks appeared first on National Cyber Security.

View full post on National Cyber Security