人人草人人-欧美一区二区三区精品-中文字幕91-日韩精品影视-黄色高清网站-国产这里只有精品-玖玖在线资源-bl无遮挡高h动漫-欧美一区2区-亚洲日本成人-杨幂一区二区国产精品-久久伊人婷婷-日本不卡一-日本成人a-一卡二卡在线视频

Spotlight: U.S. voting system vulnerabilities raise concern as hackers break into mock sites

Source: Xinhua| 2018-08-13 21:28:52|Editor: xuxin
Video PlayerClose

LAS VEGAS, the United States, Aug. 12 (Xinhua) -- Following the world's largest yearly hacking conventions Black Hat and DEFCON held in Las Vegas this week, the United States has only about 90 days left to get ready for the 2018 midterm elections.

Amid the growing debate over whether electronic voting machines (EVMs) are hackable or not, there is increasing concern about how vulnerable the systems could be to cyber-attack.

WORST VOTING MACHINE

At Black Hat USA 2018, security researcher Carsten Schuermann discovered the results of a forensic analysis of eight WinVote voting machines that had been used in Virginia elections for more than a decade.

The associate professor at IT University of Copenhagen noted there are actually two problems with insecure voting machines. The first is obvious: The systems can be easily hacked.

"But the other threat is equally important and equally dangerous, and that is the threat of an alleged cyber attack -- when people claim there was a cyber attack when there actually wasn't," said Schuermann at the conference.

Schuermann said such allegations can disrupt elections and damage the credibility of voting results.

The WinVote voting machine was used extensively in Virginia elections during 2004 and 2015. It has been dubbed the worst voting machine ever.

It runs Windows XP, service pack 0. It is by default wifi enabled. It uses WEP security and all WinVote machines appear to use the same password "abcde."

"That's not a very secure password," said Schuermann.

Several States still use voting machines similar to the WinVote.

INFORMATION THREAT

Now in its second year, organizers of "The Vote Hacking Village" at the DEFCON, which takes place immediately following Black Hat in Las Vegas every year, have packed a conference room at Caesars Palace with voting machines.

The Voting Village has invited attendees to study and identify vulnerabilities in election equipment used around the United States as well as other nations.

This year's Voting Village featured hands-on experience with at least nine types of voting equipment, almost all of which are in use in elections today.

Thousands of hackers, over 100 election officials, and about 50 kids identified and exploited various vulnerabilities within the election ecosystem, according to DEFCON.

After a few hours attack on the first day of the course, one hacker was essentially able to turn a voting machine into a jukebox, making it play music and display gifs.

Hackers were also discovering 1,784 files, including mp3s of Chinese pop songs, hidden among the operating system files of another voting machine.

The Voting Village has dramatically expanded this year to include not only more machines but also end-to-end voting infrastructure including a voter registration database and election reporting websites.

"Election cybersecurity has been a national concern since 2016," an organizer told Xinhua. "These hacks can root out weaknesses in voting machines."

Some officials that have flown to the event are becoming increasingly concerned about information threat of November's midterm elections.

In recent months, U.S. Congress has failed to pass various bills that would fund election security and infrastructure improvements ahead of the midterms.

CHILDREN'S PLAY

How vulnerable is the U.S. electronic voting system?

At the DEFCON event, nearly 40 child hackers were taking part in a contest to hack the mock versions of election board websites, and most of them were able to tamper with vote tallies. Some were even able to change candidates' names.

The quickest hacker was an 11-year-old boy, who was able to access a replica of the Florida state election website and change voting results found there in less than 10 minutes, the organizers confirmed on Sunday.

But the U.S. National Association of Secretaries of State (NASS) criticized creating mock election office networks and voter registration databases for participants to defend and/or hack as "unrealistic".

"Our main concern with the approach taken by DEFCON is that it utilizes a pseudo environment which in no way replicates state election systems, networks or physical security, " the organization said in a statement.

One election machine manufacturer, Election Systems and Software (ES&S), has also raised some questions about the value of the Voting Village.

"We at the Voting Village, along with our counsel, remain confident that our activities are lawful and are happy to address any of ES&S's legal concerns directly," DEFCON said in a statement.

TOP STORIES
EDITOR’S CHOICE
MOST VIEWED
EXPLORE XINHUANET
010020070750000000000000011100001373875731
主站蜘蛛池模板: 最好看的2019中文大全在线观看 | 黄色一级片在线免费观看 | 国产亚洲欧美视频 | 国产又大又长又粗 | 国产第6页 | 黄色一级片一级片 | 91国产丝袜播放在线 | 国产在线1区 | 精品美女 | 日韩偷拍一区 | 国产精品有限公司 | 97人人干 | 一区二区三区欧美在线 | 91丨porny丨在线 | 欧美日韩在线视频一区 | 久久久精品999 | 国产成人久久久 | 欧美z○zo重口另类黄 | 免费成人电影在线观看 | 日本韩国中文字幕 | 香蕉综合在线 | 污色视频 | 国产精品日韩欧美 | 成人三级影院 | 久久精品在线播放 | 天天操天天射天天舔 | 久久91av| 午夜精品久久久久久久久久久 | 一区二区三区中文字幕在线观看 | 美日韩一区二区 | 黄色三级网站在线观看 | 破处视频在线观看 | 日韩欧美成人网 | 日韩精品无码一区二区三区 | 免费国产黄色片 | 天天操好逼 | 欧美高清久久 | 亚洲女同一区二区 | 国产在线拍揄自揄拍无码视频 | 蜜臀精品一区二区三区 | 国产精品porn | 中文字幕亚洲无线码在线一区 | 国内精品999 | 在线观看国产网站 | 又大又粗又爽18禁免费看 | 久久精品国产99国产精品 | 欧美中文字幕在线观看 | 欧美老熟妇乱大交xxxxx | 少妇太爽了太深了太硬了 | 日韩av免费 | 蜜臀久久99精品久久久无需会员 | 亚洲激情久久 | 中文字幕乱码无码人妻系列蜜桃 | av在线视 | 国产精品老熟女一区二区 | 91精品国产色综合久久不卡98 | 日韩国产欧美视频 | 精品一区二区三区久久久 | 黄色网址最新 | 国产精品jizz| www.av在线.com| 久久久久久久久久久久久久 | 亚洲色图小说 | 久久久久久一区二区 | 久久免费高清 | 日韩欧美视频一区二区 | 日韩av不卡一区 | 干爹你真棒插曲免费 | 国内精品国产成人国产三级 | 久久综合久久综合久久 | 欧美日韩中文字幕在线 | 久久久久久免费毛片精品 | 国产亚洲精品久久久久久777 | 午夜整容室 | 成人毛片大全 | 午夜丁香婷婷 | 91色多多 | 福利视频在线免费观看 | 农村末发育av片一区二区 | 久久婷婷热 | av一级大片 | 国产精品亚洲AV色欲三区不卡 | 美国一区二区三区 | 欧美精品99 | 日本久久高清 | 成人免费看视频 | 在哪里可以看毛片 | 国产精品呻吟 | 国产农村熟妇videos | 精品一区二区免费视频 | 亚洲香蕉 | 夜夜操网 | 五十路在线 | 九九福利视频 | 国产精品丝袜在线 | 国产精品二区三区 | 91成人看片 | 亚洲久草 | 中文字幕91 |