Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
After DHS Notice, 21 States Reveal They Were Targeted During Election
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 2
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/27/2017 | 11:12:37 AM
Re: Really? We're still pointing fingers at the Russians?
There are any number of fine countries to blame - North Korea and China to start with That is true, I would add many others that have capabilities to execute an attack.
Dr.T
100%
0%
Dr.T,
User Rank: Ninja
9/27/2017 | 11:11:24 AM
Re: Really? We're still pointing fingers at the Russians?
Virginia using fake ID's, not counting all the dead people who come in to vote (huh?). Yes, fake ID would be another major issue for an selection system. All needs to be avoided,
Dr.T
100%
0%
Dr.T,
User Rank: Ninja
9/27/2017 | 11:09:43 AM
Re: Really? We're still pointing fingers at the Russians?
What's the evidence it was the Russians. Good question. There may not be a clear set of evidence. However Russians and many others have interests in attacking US systems.
Dr.T
100%
0%
Dr.T,
User Rank: Ninja
9/27/2017 | 11:08:09 AM
DHS is late
It is a little bit late for DHS to come out with this information, everybody knows not only Russians but may other countries try to attack other counties systems and that includes election systems too.
jenshadus
50%
50%
jenshadus,
User Rank: Strategist
9/27/2017 | 10:42:45 AM
Re: Really? We're still pointing fingers at the Russians?
Amen
REISEN1955
100%
0%
REISEN1955,
User Rank: Ninja
9/27/2017 | 9:50:09 AM
Re: Really? We're still pointing fingers at the Russians?
There are any number of fine countries to blame - North Korea and China to start with and just assuming that all BAD in the world belongs to Russian hackers is simplistic.  IP trace does not mean a tinker's damn as those can be hidden, fudged quite easily.    As for me,I personally fear hackers from Towaco, New Jerssy!!!  Now THAT is a tough area!!! LOL
screwbird
50%
50%
screwbird,
User Rank: Strategist
9/26/2017 | 10:37:43 PM
Re: Really? We're still pointing fingers at the Russians?
It would be nice to know how attribution was established. 
jenshadus
67%
33%
jenshadus,
User Rank: Strategist
9/26/2017 | 10:01:00 AM
Really? We're still pointing fingers at the Russians?
There are so many things in this article that I disagree with.  I'll just point out one.

What's the evidence it was the Russians.  I went to Defcon and it took many of these people but 10 to 15 minutes to hack into the sample machines that were available.  I heard that one of them turned the booth into a PACMAN game.  Don't know if that's also true.  Virginia had one 100% red country that voted 100% blue, Maryland is notorious for sending people to vote in Virginia using fake ID's, not counting all the dead people who come in to vote (huh?). 

 
<<   <   Page 2 / 2


Cybersecurity Industry: It's Time to Stop the Victim Blame Game
Jessica Smith, Senior Vice President, The Crypsis Group,  2/25/2020
5 Ways to Up Your Threat Management Game
Wayne Reynolds, Advisory CISO, Kudelski Security,  2/26/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9431
PUBLISHED: 2020-02-27
In Wireshark 3.2.0 to 3.2.1, 3.0.0 to 3.0.8, and 2.6.0 to 2.6.14, the LTE RRC dissector could leak memory. This was addressed in epan/dissectors/packet-lte-rrc.c by adjusting certain append operations.
CVE-2020-9432
PUBLISHED: 2020-02-27
openssl_x509_check_host in lua-openssl 0.7.7-1 mishandles X.509 certificate validation because it uses lua_pushboolean for certain non-boolean return values.
CVE-2020-9433
PUBLISHED: 2020-02-27
openssl_x509_check_email in lua-openssl 0.7.7-1 mishandles X.509 certificate validation because it uses lua_pushboolean for certain non-boolean return values.
CVE-2020-9434
PUBLISHED: 2020-02-27
openssl_x509_check_ip_asc in lua-openssl 0.7.7-1 mishandles X.509 certificate validation because it uses lua_pushboolean for certain non-boolean return values.
CVE-2020-6383
PUBLISHED: 2020-02-27
Type confusion in V8 in Google Chrome prior to 80.0.3987.116 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.