Saturday, December 7, 2019
  • Going After the Good Guys: The Government’s Ransomware Identity Crisis
  • Automate User Deprovisioning
  • Amazon Battles Leaky S3 Buckets with a New Security Tool
  • United States Of American National Pearl Harbor Remembrance Day
  • Juice Jacking – meh!

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming
    • On-Demand
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
  • Library

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Careers Security Awareness Security Bloggers Network 

Home » Cybersecurity » Careers » Are Your Local Elections at Risk of Being Hacked?

Are Your Local Elections at Risk of Being Hacked?

by Tripwire Guest Authors on November 6, 2018

Questions about the integrity of voting mechanisms remain just as pressing now in the 2018 election cycle as they were in 2016. So-called “hacktivists” continued to stage attacks in 2017, and hackers are expected to attempt to manipulate, influence or obstruct the 2018 election process across the country. To understand how your local election could be affected this time around, let’s briefly look back at what happened in 2016.

Election Hacking in 2016

The 2016 election has been under investigation for hacking and other forms of voter manipulation for the past two years. The extent of efforts by hackers to manipulate the outcome of the election isn’t fully known yet. Even so, several high-profile cases of hacking have surfaced during the investigation.

Local Elections at Risk

Maurice Turner, a senior technologist at the Center for Democracy and Technology, outlines the three biggest cybersecurity targets in local elections for 2018 and beyond:

  • Voter Registration: Hackers may target state databases containing voter information, which would allow them to alter registration, identification and/or party affiliation information.
  • County Websites: Hackers may attempt to take down county websites and servers using a Distributed Denial of Service Attack (DDoS) to delay or access election results after polls close.
  • Social Media: Hackers may breach official social media accounts for different counties in order to supply misinformation that confuses voters and discourages voter participation.

These aren’t the only threats facing local elections, however. A skilled hacker might employ a range of methods to disrupt a local election. Phishing and spear-phishing attacks, for instance, were commonly employed during the 2016 election. They often targeted top campaign officials.

Even then, a disruption to an election at the local scale doesn’t have to include a hacking attempt. Social engineering tactics employed through social media remain potent tools. Social media accounts (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Tripwire Guest Authors. Read the original post at: https://www.tripwire.com/state-of-security/security-awareness/local-elections-risk-hacked/

November 6, 2018November 6, 2018 Tripwire Guest Authors Elections, Hacking, local elections, security, Security Awareness
  • ← US Supreme Court ends the net neutrality debate by rejecting the 2015 net neutrality repeal allowing the internet to be free and open again
  • Avast Business Antivirus Pro Plus Awarded Top Product by AV-TEST | Avast Business →
Featured Blog

Enzoic

Automate Password Policy & NIST Password Guidelines

Enzoic

Old vs. New Methods for Employee Password Hardening

Enzoic

Shop Safely This Cyber Monday

Enzoic

Disney and the Password Reuse Problem

Subscribe to our Newsletters

Get breaking news, free eBooks and upcoming events delivered to your inbox.
  • View Security Boulevard Privacy Policy

Most Read on the Boulevard

StrandHogg Pwns 80% of Android Phones; Google Fiddles While Platform Burns
Don’t (Geo)Fence Me In: Courts Order Google To Give Up Location Data
Quantum Computing Is Coming: Are You Cyber Ready?
Are Passwords Now Passé?
Learning From Health Care’s IoT Security Strategy
Biggest 2019 data breaches: Some of the worst of the worst
Why Blue Teams Need RASP: Continuous Application Threat Monitoring with Runtime Exploit Prevention
The Ultimate Hacker Movies List for 2020
Cybersecurity needs in megacorporations | Cyber Work Podcast
Cliff Notes to 5 Studies about the State of Cybersecurity in Healthcare

Upcoming Webinars

Mon 09

Cloud Security – Keeping Serverless Data Safe

December 9 @ 11:00 am - 12:00 pm
Tue 10

Securing Mobile Apps, From the Inside Out

December 10 @ 1:00 pm - 2:00 pm

More Webinars

Download Free eBook

Open Source Security: Weighing the Pros and Cons

Recent Security Boulevard Chats

  • Cloud, DevSecOps and Network Security, All Together?
  • Security-as-Code with Tim Jefferson, Barracuda Networks
  • ASRTM with Rohit Sethi, Security Compass
  • Deception: Art or Science, Ofer Israeli, Illusive Networks
  • Tips to Secure IoT and Connected Systems w/ DigiCert

Industry Spotlight

Learning From Health Care’s IoT Security Strategy
Cybersecurity Industry Spotlight IoT & ICS Security Security Boulevard (Original) 

Learning From Health Care’s IoT Security Strategy

December 6, 2019 Mike Nelson | Yesterday 0
Why You Need PAM and VPAM in 2020
Cybersecurity Identity & Access Industry Spotlight Security Boulevard (Original) 

Why You Need PAM and VPAM in 2020

December 5, 2019 Tony Howlett | 2 days ago 0
Cybersecurity Identity & Access Industry Spotlight Security Boulevard (Original) 

Are Passwords Now Passé?

December 4, 2019 Ori Eisen | 3 days ago 0

Top Stories

Apple Passive-Aggressive PR Sparks Privacy Fear (Yet Again)
Cybersecurity Endpoint Featured Mobile Security News Security Boulevard (Original) Spotlight Threats & Breaches 

Apple Passive-Aggressive PR Sparks Privacy Fear (Yet Again)

December 6, 2019 Richi Jennings | Yesterday 0
StrandHogg Pwns 80% of Android Phones; Google Fiddles While Platform Burns
Cybersecurity Data Security Featured Malware Mobile Security News Security Awareness Security Boulevard (Original) Spotlight 

StrandHogg Pwns 80% of Android Phones; Google Fiddles While Platform Burns

December 3, 2019 Richi Jennings | 4 days ago 0
TrueDialog Leaks 600GB of Personal Data, Affecting Millions
Cloud Security Cybersecurity Data Security Featured Governance, Risk & Compliance News Security Boulevard (Original) Spotlight 

TrueDialog Leaks 600GB of Personal Data, Affecting Millions

December 2, 2019 Richi Jennings | Dec 02 0

Security Humor

via    the comic delivery system monikered  Randall Munroe  at   XKCD  !

XKCD, Is It Christmas?

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: info@securityboulevard.com

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • Privacy Policy
  • DMCA Compliance Statement

Other Mediaops Sites

  • Container Journal
  • DevOps.com
  • DevOps Connect
  • DevOps Institute
Copyright © 2019 MediaOps Inc. All rights reserved.
Our website uses cookies. By continuing to browse the website you are agreeing to our use of cookies. For more information on how we use cookies and how you can disable them, please read our Privacy Policy.