Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Hackers Exploit Voting Machine Vulnerabilities at DefCon

    By
    eWEEK Staff
    -
    August 1, 2017
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Today’s topics include a demonstration by hackers at DefCon on voting machine vulnerabilities; new U.S. cyber-security legislation that could help reassert Fourth Amendment rights; Microsoft previewing phone-friendly features in the Windows 10 Creators update; and Aqua Security revealing developer security risks with Docker containers.

      Last week’s DefCon 25 hacking conference in Las Vegas showcased a Voting Village that gave attendees the opportunity to attempt to exploit weaknesses in voting machine designs.

      A number of security researchers were successful in their attempts, including Carsten Schurmann, who was able to gain remote access to a WinVote machine that was actually used in a local election in 2014. The system had an open port that allowed Windows Remote Desktop sessions, according to Schurmann, adding that the port was discovered simply by running the open-source Wireshark network packet capture program.

      Other hackers in the Voting Village also used Wireshark to compromise voting machines that had known vulnerabilities simply with the open-source Metasploit penetration testing framework.

      Senators Mike Lee and Patrick Leahy have introduced the Senate version of a bipartisan bill to modernize the Electronic Communications Privacy Act. The new bill, which would modernize the original ECPA to require warrants for access to electronic communications such as email, also adds a requirement for a warrant for location information.

      The original House bill, the Email Privacy Act, did not cover location information.

      The bill, which if passed, would need to go to a conference committee for reconciliation. While the bill appears to have broad bipartisan support, it still needs to go the relevant committees before it will be considered by the full Senate. The bill also allows for suppression of evidence in cases where the information was obtained in violation of the ECPA.

      At its Build developer conference in May, Microsoft teased some features in the upcoming Windows 10 Fall Creators Update that will allow users to resume on an iOS or Android device tasks they started on a PC and vice versa. Now, some users can take an early, if limited, peek at those phone-friendly features and the cross-device experiences they enable with the release of build 16251 to the Windows Insider program.

      A new Phone icon now appears in the Windows Settings screen, inviting users to link their Android smartphones or Apple iPhones. For now, the option only supports Android and is restricted to handing off mobile and browsing sessions to PCs.

      In a session at the Black Hat USA conference in Las Vegas last week, researchers from Aqua Security detailed vulnerabilities they found in Docker that could have put developers at risk.

      The vulnerabilities discovered by Aqua Security have already been responsibly disclosed to Docker and were fixed in the Docker 17.05 update released at the end of May. The flaws specifically take aim at Docker for Mac and Docker for Windows desktop releases for developers and could have enabled an attacker to infect a system.

      In an interview with eWEEK to discuss the findings, Sagie Dulce, senior security researcher at Aqua Security, explained that with Docker for Windows, the default configuration enabled anonymous access to the Docker API through an open TCP port. As it turns out, that TCP port could be abused by an attacker through a malicious webpage to attack a developer. 

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×