MIT researchers say mobile voting app piloted in U.S. is rife with vulnerabilities

Credit to Author: Lucas Mearian| Date: Thu, 13 Feb 2020 13:30:00 -0800

Elections officials in numerous states have piloted various mobile voting applications as a method of expanding access to the polls, but MIT researchers say one of the more popular apps has security vulnerabilities that could open it up to tampering by bad actors.

The MIT analysis of the application, called Voatz, highlighted a number of weaknesses that could allow hackers to “alter, stop, or expose how an individual user has voted.”

Additionally, the researchers found that Voatz’s use of Palo Alto-based vendor Jumio for voter identification and verification poses potential privacy issues for users.

To read this article in full, please click here

Read more

Cyber tips for safe online dating: How to avoid privacy gaffs, exploits, and scams

Credit to Author: Malwarebytes Labs| Date: Thu, 13 Feb 2020 16:36:45 +0000

We give advice on safe online dating, including steering clear of scams, buttoning up on privacy, and avoiding vulnerable apps.

Categories:

Tags:

(Read more…)

The post Cyber tips for safe online dating: How to avoid privacy gaffs, exploits, and scams appeared first on Malwarebytes Labs.

Read more

Google Maps: online interventions with offline ramifications

Credit to Author: Malwarebytes Labs| Date: Fri, 07 Feb 2020 19:24:50 +0000

We look at some of the ways people have gamed online mapping systems over the years.

Categories:

Tags:

(Read more…)

The post Google Maps: online interventions with offline ramifications appeared first on Malwarebytes Labs.

Read more

HorseDeal Riding on The Curveball!

Credit to Author: Jayesh kulkarni| Date: Wed, 05 Feb 2020 06:17:49 +0000

It’s surprising to see how quickly attackers make use of new vulnerabilities in malware campaigns. Microsoft recently patched a very interesting vulnerability in their monthly Patch Tuesday update for January 2020. It’s a spoofing vulnerability in Windows CryptoAPI (Crypt32.dll) validation mechanism for Elliptic Curve Cryptography (ECC) certificates. An attacker could…

Read more

Iowa Caucus chaos likely to set back mobile voting

Credit to Author: Lucas Mearian| Date: Tue, 04 Feb 2020 12:51:00 -0800

A coding flaw and lack of sufficient testing of an application to record votes in Monday’s Iowa Democratic Presidential Caucus will likely hurt the advancement and uptake of online voting.

While there have been hundreds of tests of mobile and online voting platforms in recent years – mostly in small municipal or corporate shareholder and university student elections – online voting technology has yet to be tested for widespread use by the general public in a national election.

“This is one of the cases where we narrowly dodged a bullet,” said Jeremy Epstein, vice chair of the Association for Computing Machinery’s US Technology Policy Committee (USTPC). “The Iowa Democratic Party had planned to allow voters to vote in the caucus using their phones; if this sort of meltdown had happened with actual votes, it would have been an actual disaster. In this case, it’s just delayed results and egg on the face of the people who built and purchased the technology.”

To read this article in full, please click here

Read more

Washington Privacy Act welcomed by corporate and nonprofit actors

Credit to Author: David Ruiz| Date: Tue, 04 Feb 2020 16:35:25 +0000

The Washington Privacy Act would extend new data rights of access, correction, and deletion to Washington residents, with new rules on facial recognition.

Categories:

Tags:

(Read more…)

The post Washington Privacy Act welcomed by corporate and nonprofit actors appeared first on Malwarebytes Labs.

Read more