US House Candidates Vulnerable To Hacks, Researchers Say (reuters.com) 35
About 30 percent of House candidates running for office this year have significant cybersecurity issues with their campaign websites, according to a new study. Reuters: The research was unveiled on Sunday at the annual Def Con security conference in Las Vegas, where some attendees have spent three days hacking into voting machines to highlight vulnerabilities in technology running polling operations. A team of four independent researchers led by former National Institutes for Standards and Technology security expert Joshua Franklin concluded that the websites of nearly one-third of U.S. House candidates, Democrats and Republicans alike, are vulnerable to attacks. NIST is a U.S. Commerce Department laboratory that provides advice on technical issues, including cyber security. Using automated scans and test programs, the team identified multiple vulnerabilities, including problems with digital certificates used to verify secure connections with users, Franklin told Reuters ahead of the presentation. The warnings about the midterm elections, which are less than three months away, come after Democrats have spent more than a year working to bolster cyber defenses of the party's national, state and campaign operations.
Extremely misleading article. (Score:1, Insightful)
This article is misleading and poorly written. Those house members are NOT vulnerable and never have been. No proof was provided and all sources were obviously biased towards Democrat party Clinton and Soros fundeds. This writeup of bad journalism is example again of why many regular Americans see mainstream media as enemy of people, and not friend.
Re: Extremely misleading article. (Score:2)
It is misleading since nothing of real value can be done to those websites.
It is the old xkcd.
https://xkcd.com/932/ [xkcd.com]
I don't hide tricks using links.
Re: (Score:2)
You've got an interesting way of speaking. If I had to guess I'd say... Minnesota?
Re: (Score:2)
Who said anything about Russia?
Re: (Score:2)
The M which stands for... Russia?
Re: (Score:2)
Even if it is biased towards them, it's done in such an unintentionally backhanded way that it only ends up making the DNC look like a pack of idiots.
Seems the DNC is ready. (Score:2)
Since Krikorian joined the DNC a year ago, the party has moved email and data storage to Google cloud and replaced most Windows computers with easier-to-defend Apple hardware and Google Chromebooks, he said.
Ahh, security by moving things into the cloud and using a different OS. That should fix everything. As we all know nobody has ever gotten a hold of cloud data and there are viruses/vulnerabilities for MAC; at least that's what my users tell me.
Re:Seems the DNC is ready. (Score:4, Informative)
Which is funny since the DNC breach was due to them falling for a phishing scheme and had nothing to do with OS security.
They are hacks? (Score:4, Insightful)
Vulnerable to hacks? My local representative IS a hack!
Problems with Digital Signatures (Score:5, Interesting)
Easy fix: (Score:1)
Just get your own private email server.
Re: (Score:1)
The State Dept. regular email server did get hacked, but hers did not (as far as known).
Similar survey of 2016 Senate web sites (Score:2)
http://cybertical.com/2016-senate-cybersecurity.html
The floor is lava (Score:4, Funny)
US House Candidates Vulnerable To Hacks, Researchers Say
Well, hacked water heaters [slashdot.org] are a danger. Why not hacked air heaters?
DNC still doing a really bad job (Score:2)
The DNC, which has had some rather famous problems, is doing this about it: