Security vendor demonstrates hack of US e-voting machine

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Nov 07, 2016
Featured Image

US election day faces specter of cyberattacks

Don't be surprised if hackers make their presence felt on U.S. Election Day. Distributed denial-of-service attacks and high-profile leaks are among the tactics they might use if they try to influence Tuesday's vote. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Security vendor demonstrates hack of US e-voting machine
Best Deals of the Week, October 31st - November 4th - Deal Alert
What these CSOs did on their first days
EMV, fraud mitigation or migration?
War stories: escalation attack loopback
What about the personal data on those millions of recalled Note7s?
Who is the information security preferred candidate? A look at presidential election 2016

White Paper: Ping Identity Corporation

Balancing Personalization & Privacy

Customers demand access anytime, anywhere. But if they feel their privacy is compromised they're gone. Customer IAM solutions require a balance. This guide provides 3 key features necessary to enable preference and privacy management. Read More

Thumbnail Image

Security vendor demonstrates hack of US e-voting machine

A hacker armed with a US$25 PCMCIA card can, within a few minutes, change the vote totals on an aging electronic voting machine in limited use in 13 U.S. states, a cybersecurity vendor has demonstrated. But some security experts questioned the timing of the video. Read More

Thumbnail Image
DealPost

Best Deals of the Week, October 31st - November 4th - Deal Alert

Check out this roundup of the best deals on gadgets, gear and other cool stuff we have found this week, the week of October 24th. All items are highly rated, and dramatically discounted. Read More

Thumbnail Image

What these CSOs did on their first days

There are a million things to worry about but these chief security officers provide advice on how to start off on the right foot. Read More

Thumbnail Image

EMV, fraud mitigation or migration?

It's been just over a year since the roll out, but how much fraud has EMV really prevented? Read More

Thumbnail Image

War stories: escalation attack loopback

Read More

Thumbnail Image

What about the personal data on those millions of recalled Note7s?

The users of millions of faulty Samsung Galaxy Note7s face a another potential dilemma: The fate of their personal data on the devices. Read More

Thumbnail Image

Who is the information security preferred candidate? A look at presidential election 2016

Trump or Clinton. Which of the 2 leading candidates is best from an information security perspective? Should a CISO prefer one over the other? Read More

White Paper: RSA Security Inc

Benchmark Your Threat Detection Effectiveness

See how global organizations rate their cyber threat detection capabilities and how your organization compares. Then, discover how they plan to evolve their security technology and strategy in the future. Read More

Top 5 Stories

1. Top 5 reasons to quit your cybersecurity job
2. What these CSOs did on their first days
3. DDoS attack on Dyn could have been prevented
4. Chris Nickerson: Bring a bit more Zen to cybersecurity
5. Database configuration issues expose 191 million voter records

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.