3 nightmare election hack scenarios

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Oct 06, 2016
Featured Image

Building an insider threat program that works — Part 2

A world-class insider threat program must have three core characteristics: prevent insider threat events, adapt to threats and be able to scale. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

3 nightmare election hack scenarios
Hacked voter registration systems: a recipe for election chaos
Yahoo may have allowed US government to search user emails
Will a focus on data protection save the day?
If the election is hacked, we may never know
Cerber ransomware kills database connections to access important data
One election-system vendor uses developers in Serbia
Hacking an election is about influence and disruption, not voting machines
Q&A: The myths and realities of hacking an election

White Paper: VMware

A Fresh Approach for Improved Application Delivery

Facing a costly, complex Citrix XenApp upgrade? Reduce the costs, reduce the complexity, by considering a new approach for desktop and application delivery. Read More

Thumbnail Image

3 nightmare election hack scenarios

The question on the mind of many U.S. voting security experts is not whether hackers could disrupt a U.S. election. Instead, they wonder how likely an election hack might be and how it might happen Read More

Thumbnail Image

Hacked voter registration systems: a recipe for election chaos

How do you disrupt an election? Hacking a voter registration database could very well do just that. Read More

Thumbnail Image

Yahoo may have allowed US government to search user emails

Yahoo has reportedly searched through all of its users' incoming emails with a secret software program that's designed to ferret out information for U.S. government agencies. Read More

Thumbnail Image

Will a focus on data protection save the day?

Datacastle's Ron Faith discusses some simple thoughts that can bring security and data protection to the forefront of enterprise planning. Read More

Thumbnail Image

If the election is hacked, we may never know

At particular risk are touch-screen voting machines that have no paper trails. If those are hacked or a hack is even suspected, it will be difficult to prove -- and impossible to reconstruct the real tally. Read More

Thumbnail Image

Cerber ransomware kills database connections to access important data

In order to encrypt some of the most important data stored on computers and servers, the Cerber ransomware now tries to kill processes associated with database servers. Read More

Thumbnail Image

One election-system vendor uses developers in Serbia

But even an all-U.S. team is no guarantee of security. Read More

Thumbnail Image

Hacking an election is about influence and disruption, not voting machines

Every time there's an election, the topic of hacking one comes to the surface. During a presidential election, that conversation gets louder. Yet, even the elections held every two years see some sort of vote hacking coverage. But can you really hack an election? Maybe, but that depends on your goals. Read More

Thumbnail Image

Q&A: The myths and realities of hacking an election

Election hacking has become a key topic during this year's presidential elections, more so now that candidates and voters are being actively targeted by actors that are assumed to be acting with Russian support. In this modified edition of CSO Online's Hacked Opinions series, we explore the myths and realities of hacking an election, by speaking with a number of security experts. Read More

White Paper: Niara

Amplify your Alert Prioritization and Incident Investigation

See how analytics can amplify alert prioritization and incident investigation skills of security analyst teams, allowing them to efficiently prioritize alerts from other systems, and easily investigate and triage incidents through analytics-driven visibility. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Sneak peek: 15 gadgets to put on your holiday wish list

Most dangerous cyber celebrities of 2016 Read More

Most-Read Stories

1. Level 3 acknowledges network outage
2. Top U.S. colleges for computer science
3. Down the rabbit hole, part 3: Linux and Tor are key to ensuring privacy, security
4. 19 free cloud storage options
5. New Dynamic for CPE
6. 7 free tools every network needs
7. First Look: Pixel, AI, Google Home and more
8. Level 3 blames huge network outage on unspecified configuration error
9. U.S. cellular carriers charge too much, and here’s proof
10. Creepy clowns cause sheriff to consult with FBI and Homeland Security
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.