Skip to main content

Report suggests local election officials’ emails could be at risk for phishing attempts Cybersecurity firm Area 1 found 666 of 10,000 election workers used personal email accounts

Photo by JEFF KOWALSKY/AFP via Getty Images

Many election officials across the US are using email systems that could make them more susceptible to phishing attempts, according to a new report in The Wall Street Journal. Area 1 Security found less than 20 percent of 10,000 state and local election administrations had advanced anti-phishing controls in place, and about 666 of the election officials were relying on personal email addresses for election-related matters.

Jurisdictions in several states were using a version of free Exim software that Russia’s GRU intelligence service had targeted for online attacks starting in 2019, according to the Journal. Security experts told the Journal it was unlikely that weak email security would lead to vote hacking, however, since the email systems aren’t connected to systems that count votes.

But it raises concerns that local election officials may be underprepared for possible intrusions into their email systems. GRU was accused of stealing and leaking emails from Hillary Clinton’s presidential campaign in 2016, and in 2018, GRU had registered web domains that appeared to spoof government web addresses, ostensibly for phishing purposes. Microsoft seized the domains before officials believe any damage was done.

And already this year, foreign hackers have targeted the personal email accounts of staffers working on the campaigns of presumptive Democratic nominee Joe Biden and President Trump. State-backed hackers from China tried to target staffers’ emails on the Biden campaign, while Iranian hackers targeted the Trump campaign staff’s emails. Google, which reported the attempts, said last month it had not seen evidence that those attacks were successful.


                                                                                                                           Source:The Verge

Comments

Popular posts from this blog

Install Aircrack-ng on Ubuntu linux OS

Install Aircrack-ng on Ubuntu -AnoxBotox Aircrack-ng is a whole suite of tools for Wireless Security Auditing. It can be used to monitor, test, crack or attack Wireless Security Protocols like WEP, WPA, WPA2. Aircrack-ng is command line based and is available for Windows and Mac OS and other Unix based Operating systems. Aircrack-ng suite contains a lot of tools used for various purposes but here we’ll only look at some important tools that are used more often in Wireless Security testing. Airmon-ng Airmon-ng is used to manage wireless card modes and to kill unnecessary processes while using aircrack-ng. To sniff a wireless connection, you need to change your wireless card from managed mode to monitor mode and airmon-ng is used for that purpose. Airodump-ng Airodump-ng is a wireless sniffer that can capture wireless data from one or more wireless Access Points. It is used to analyze nearby Access Points and to capture handshakes. Aireplay-ng Aireplay-ng is use...

On and off screen, Olivia de Havilland exhibited grit and grace

On screen and off, Olivia de Havilland embodied grit and grace. (Photo by Hulton Archive/Getty Images) (CNN) Olivia de Havilland  represented a throwback to a bygone era, one of the last vestiges of Hollywood during its glamorous golden age. On screen, her characters held their own opposite Scarlett O'Hara and Robin Hood, appearing in black and white and florid color. Although she was a beautiful, often demure personality in movies, de Havilland exhibited a grit offscreen that might have helped explain her longevity, dying decades after many of her co-stars, at the age of 104. As if to punctuate that point, the actress sued the FX network production of  "Feud: Bette and Joan,"  a series devoted to Bette Davis and Joan Crawford, for its depiction of her as a supporting player, making clear that even as a centenarian, she was not someone with which to trifle. Olivia de Havilland, star of 'Gone With the Wind,' dies at 104 De Havilland, famously, had gone to court to ...

Asus ROG Phone 3 Has a Hidden 160Hz Refresh Rate Option: Report Asus has confirmed the 160Hz display mode but says it is only for internal testing purposes.

Asus ROG Phone 3 has a secret 160Hz refresh rate that can be unlocked using the Android Debug Bridge (ADB) command-line tool. Launched in India last week, the flagship gaming phone comes with a refresh rate of 144Hz on paper. The Taiwanese tech giant has also confirmed the existence of the advanced refresh rate option, which it says is only meant for internal testing and not for end-users. The phone's display, however, has not been calibrated to suit a refresh rate of 160Hz. XDA Developers  found the hidden  160Hz refresh option, sharing steps on how to unlock it. It says that the mode can only be activated by using the ADB PC app. Once there, the user needs to you run a command from a prompt or terminal window, “adb shell setprop debug.vendor.asus.fps.eng 1.” Following this, when the phone is rebooted, the 160Hz refresh rate option should start appearing in the display settings. Asus ROG Phone 3 Specifications The  Asus ROG Phone 3  sports a 6.59-inch full-HD+ AMOLE...