Normal view
Internet Voting is Too Insecure for Use in Elections
No matter how many times we say it, the idea comes back again and again. Hopefully, this letter will hold back the tide for at least a while longer.
Executive summary: Scientists have understood for many years that internet voting is insecure and that there is no known or foreseeable technology that can make it secure. Still, vendors of internet voting keep claiming that, somehow, their new system is different, or the insecurity doesnβt matter. Bradley Tusk and his Mobile Voting Foundation keep touting internet voting to journalists and election administrators; this whole effort is misleading and dangerous.
I am one of the many signatories.
'BBC wil series voor YouTube maken en buiten het VK uitbrengen'
-
Bright Cybercrime

- Rijksoverheid waarschuwt: βNederlanders zetten online de deur open voor criminelenβ
Rijksoverheid waarschuwt: βNederlanders zetten online de deur open voor criminelenβ

-
Bright Cybercrime

- Gevoelige data via satellieten schrikbarend makkelijk af te luisteren met simpele schotel
Gevoelige data via satellieten schrikbarend makkelijk af te luisteren met simpele schotel

-
Bright Cybercrime

- Meer Nederlanders slachtoffer van cybercrime, één misdaad springt er opvallend uit
Meer Nederlanders slachtoffer van cybercrime, één misdaad springt er opvallend uit

Google waarschuwt voor oplichting via Google Maps: hier moet je op letten

Hackers stelen een bizar bedrag bij de grootste crypto-diefstal ooit

Dit zijn de beste wachtwoord-apps van dit moment

Microsoft Copilot krijgt optie om producten te kopen en te betalen
-
Data and computer security | The Guardian

- βAll brakes are offβ: Russiaβs attempt to rein in illicit market for leaked data backfires
βAll brakes are offβ: Russiaβs attempt to rein in illicit market for leaked data backfires
Russian state has tolerated parallel probiv market for its convenience but now Ukrainian spies are exploiting it
Russia is scrambling to rein in the countryβs sprawling illicit market for leaked personal data, a shadowy ecosystem long exploited by investigative journalists, police and criminal groups.
For more than a decade, Russiaβs so-called probiv market β a term derived from the verb βto pierceβ or βto punch into a search barβ β has operated as a parallel information economy built on a network of corrupt officials, traffic police, bank employees and low-level security staff willing to sell access to restricted government or corporate databases.
Continue reading...
Β© Photograph: Alexander Zemlianichenko/AP

Β© Photograph: Alexander Zemlianichenko/AP

Β© Photograph: Alexander Zemlianichenko/AP
-
Data and computer security | The Guardian

- London councils enact emergency plans after three hit by cyber-attack
London councils enact emergency plans after three hit by cyber-attack
Kensington and Westminster councils investigating whether data has been compromised as Hammersmith and Fulham also reports hack
Three London councils have reported a cyber-attack, prompting the rollout of emergency plans and the involvement of the National Crime Agency (NCA) as they investigate whether any data has been compromised.
The Royal Borough of Kensington and Chelsea (RBKC), and Westminster city council, which share some IT infrastructure, said a number of systems had been affected across both authorities, including phone lines. The councils shut down several computerised systems as a precaution to limit further possible damage.
Continue reading...
Β© Photograph: Artur Marciniec/Alamy

Β© Photograph: Artur Marciniec/Alamy

Β© Photograph: Artur Marciniec/Alamy
-
Data and computer security | The Guardian

- Knee-jerk corporate responses to data leaks protect brands like Qantas β but consumers are getting screwed
Knee-jerk corporate responses to data leaks protect brands like Qantas β but consumers are getting screwed
When courts ban people from accessing leaked data β as happened after the airlineβs data breach β only hackers and scammers win
Get our breaking news email, free app or daily news podcast
Itβs become the playbook for big Australian companies that have customer data stolen in a cyber-attack: call in the lawyers and get a court to block anyone from accessing it.
Qantas ran it after suffering a major cybersecurity attack that accessed the frequent flyer details of 5 million customers.
Continue reading...
Β© Photograph: Bianca de Marchi/AAP

Β© Photograph: Bianca de Marchi/AAP

Β© Photograph: Bianca de Marchi/AAP
-
Data and computer security | The Guardian

- Six out of 10 UK secondary schools hit by cyber-attack or breach in past year
Six out of 10 UK secondary schools hit by cyber-attack or breach in past year
Hackers are more likely to target educational institutions than private businesses, government survey shows
When hackers attacked UK nurseries last month and published childrenβs data online, they were accused of hitting a new low.
But the broader education sector is well used to being a target.
Continue reading...
Β© Photograph: MBI/Alamy

Β© Photograph: MBI/Alamy

Β© Photograph: MBI/Alamy
-
Data and computer security | The Guardian

- Hackers reportedly steal pictures of 8,000 children from Kido nursery chain
Hackers reportedly steal pictures of 8,000 children from Kido nursery chain
Firm, which has 18 sites around London and more in US, India and China, has received ransom demand, say reports
The names, pictures and addresses of about 8,000 children have reportedly been stolen from the Kido nursery chain by a gang of cybercriminals.
The criminals have demanded a ransom from the company β which has 18 sites around London, with more in the US, India and China β according to the BBC.
Continue reading...
Β© Photograph: solarseven/Getty Images/iStockphoto

Β© Photograph: solarseven/Getty Images/iStockphoto

Β© Photograph: solarseven/Getty Images/iStockphoto
-
Data and computer security | The Guardian

- UK βwoefullyβ unprepared for Chinese and Russian undersea cable sabotage, says report
UK βwoefullyβ unprepared for Chinese and Russian undersea cable sabotage, says report
CSRI finds China and Russia may be coordinating βgrey zoneβ tactics against vulnerable western infrastructure
China and Russia are stepping up sabotage operations targeting undersea cables and the UK is unprepared to meet the mounting threat, according to new analysis.
A report by the China Strategic Risks Institute (CSRI) analysed 12 incidents in which national authorities had investigated alleged undersea cable sabotage between January 2021 and April 2025. Of the 10 cases in which a suspect vessel was identified, eight were directly linked to China or Russia through flag-state registration or company ownership.
Continue reading...
Β© Photograph: John Leicester/AP

Β© Photograph: John Leicester/AP

Β© Photograph: John Leicester/AP
-
Data and computer security | The Guardian

- Russian-led cybercrime network dismantled in global operation
Russian-led cybercrime network dismantled in global operation
Arrest warrants issued for ringleaders after investigation by police in Europe and North America
European and North American cybercrime investigators say they have dismantled the heart of a malware operation directed by Russian criminals after a global operation involving British, Canadian, Danish, Dutch, French, German and US police.
International arrest warrants have been issued for 20 suspects, most of them living in Russia, by European investigators while indictments were unsealed in the US against 16 individuals.
Continue reading...
Β© Photograph: Andrew Brookes/Getty Images/Image Source

Β© Photograph: Andrew Brookes/Getty Images/Image Source

Β© Photograph: Andrew Brookes/Getty Images/Image Source
-
Data and computer security | The Guardian

- What to do if you canβt get into your Facebook or Instagram account
What to do if you canβt get into your Facebook or Instagram account
How to prove your identity after your account gets hacked and how to improve security for the future
- Phone lost or stolen? Practical steps to restore peace of mind
- UK passport lost or stolen? Here are the steps you need to take
Your Facebook or Instagram account can be your link to friends, a profile for your work or a key to other services, so losing access can be very worrying. Hereβs what to do if the worst happens.
If you have access to the phone number or email account associated with your Facebook or Instagram account, try to reset your password by clicking on the βForgot password?β link on the main Facebook or Instagram login screen. Follow the instructions in the email or text message you receive.
If you no longer have access to the email account linked to your Facebook account, use a device with which you have previously logged into Facebook and go to facebook.com/login/identify. Enter any email address or phone number you might have associated with your account, or find your username which is the string of characters after Facebook.com/ on your page. Click on βNo longer have access to these?β, βForgotten account?β or βRecoverβ and follow the instructions to prove your identity and reset your password.
If your account was hacked, visit facebook.com/hacked or instagram.com/hacked/ on a device you have previously used to log in and follow the instructions. Visit the help with a hacked account page for Facebook or Instagram.
Change the password to something strong, long and unique, such as a combination of random words or a memorable lyric or quote. Avoid simple or guessable combinations. Use a password manager to help you remember it and other important details.
Turn on two-step verification in the βpassword and securityβ section of the Accounts Centre. Use an authentication app or security key for this, not SMS codes. Save your recovery codes somewhere safe in case you lose access to your two-step authentication method.
Turn on βunrecognised loginβ alerts in the βpassword and securityβ section of the Accounts Centre, which will alert you to any suspicious login activity.
Remove any suspicious βfriendsβ from your account β these could be fake accounts or scammers.
If you are eligible, turn on βadvanced protection for Facebookβ in the βpassword and securityβ section of the Accounts Centre.
Continue reading...
Β© Photograph: bigtunaonline/Alamy

Β© Photograph: bigtunaonline/Alamy

Β© Photograph: bigtunaonline/Alamy
-
Data and computer security | The Guardian

- βSource of dataβ: are electric cars vulnerable to cyber spies and hackers?
βSource of dataβ: are electric cars vulnerable to cyber spies and hackers?
British defence firms have reportedly warned staff not to connect their phones to Chinese-made EVs
Mobile phones and desktop computers are longstanding targets for cyber spies β but how vulnerable are electric cars?
On Monday the i newspaper claimed that British defence firms working for the UK government have warned staff against connecting or pairing their phones with Chinese-made electric cars, due to fears that Beijing could extract sensitive data from the devices.
Continue reading...
Β© Photograph: Ying Tang/NurPhoto/REX/Shutterstock

Β© Photograph: Ying Tang/NurPhoto/REX/Shutterstock

Β© Photograph: Ying Tang/NurPhoto/REX/Shutterstock
-
Black Hills Information Security, Inc.

- Securing the Cloud: A Story of Research, Discovery, and Disclosure
Securing the Cloud: A Story of Research, Discovery, and Disclosure
![]()
Jordan Drysdale // tl;dr BHIS made some interesting discoveries while working with a customer to audit their Amazon Web Services (AWS) infrastructure. At the time of the discovery, we found [β¦]
The post Securing the Cloud: A Story of Research, Discovery, and Disclosure appeared first on Black Hills Information Security, Inc..


