The Security Group at
the University of California in Santa Barbara has released the
video that shows the attacks carried out against the Sequoia
voting system. I heard about the video when talking to some members of the
group, but it was never made available to the public before. The video was
shot as part of the Top-To-Bottom Review organized by the California Secretary
of State. Even though the review was carried our in July 2007, the video has
been posted only now, more than a year after (why?).
The video shows an attack where a virus-like software spreads across the
voting system. The coolest part of the video is the one that shows how the
"brainwashed" voting terminals can use different techniques to change the
votes even when a paper audit trail is used. Pretty scary stuff. The video is
proof that these types of attacks are indeed feasible and not just a
Also, the part that shows how the "tamperproof" seals can be completely
bypassed is very funny (and disturbing at the same time).
M. David Weisman, a magistrate judge in Illinois’s Eastern Division, denied a federal warrant application that would have allowed law enforcement officers to force suspects to unlock their mobile devices with a fingerprint, ruling that the suspects’ Fourth Amendment (undue search and seizure) and Fifth Amendment (self-incrimination) rights protected them from being forced to unlock […]
Elenco’s Night ‘n Day Mechanical Globe uses a system of translucent, exposed gears to rotate an internally illuminated globe that displays the seasonally adjusted, real-time night/day terminator as it spins.
Although there will never be a consensus about the best way to make coffee, any coffee connoisseur will agree that controlling the grind of your beans and balancing water temperature are the keys to a tasty cup. Since your plastic coffee pot doesn’t really allow for that kind of customization, going back to the French […]
Not all hackers are malicious information thieves—white-hat ethical hackers work with technology companies to ensure the security of their computer systems and user data. With all of today’s high-profile data breaches, ethical hackers are in considerable demand. To learn these critical skills and break into the high-paying cyber security field, try taking the courses in this […]
Making people aware of goods and services in the digital age requires an array of new strategies from social media and email to number-crunching tools like Google Analytics. To get a handle on the techniques used to capture attention and convert traffic into dollars in a crowded online environment, the Full-Stack Marketer Bundle offers 22 hours of training to get […]