Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

9/18/2018
11:28 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
100%
0%

Symantec Offers Free Website Security Service for Midterm Elections

Security vendor offers US election jurisdictions its Project Dolphin phishing/website spoofing-detection service and security resources.

Symantec is the latest security vendor to offer pro bono security services to US elections commissions and political parties and candidates amid hacking and disruption concerns in the midterm elections.

The security giant is providing for free its Project Dolphin website spoof-detection and prevention service as well as resources including election security best practices and security training videos for election jurisdictions, poll workers, candidates, and political parties. Project Dolphin can, for instance, detect phishing sites posing as legitimate campaign or state election commission websites.

Election jurisdications and parties who opt for the service would register their domains and login pages with the service so it can detect imposter sites, says Eric Chien, a Fellow with the Symantec Security Technology and Response division. Chien says the company plans to run the service for at least six months, and could expand it to the 2020 elections as well.

State and local election jurisdictions and campaigns traditionally have tight budgets and resources, especially when it comes to security. Security vendors are trying to fill that gap, especially for vulnerable elections websites, with free services for the fall midterms - Cloudflare, Google, Microsoft, Akamai, Synack, Thycotic, McAfee, Cylance, and Valimail, already had announced free services.

Philanthropy aside, the pro bono services also give those vendors a foot in the door for potential future business.

US elections officials are still haunted by the Russian-meddling and hacking activities during the 2016 US presidential election, but many jurisdictions haven't had the time or funds to make major security upgrades. While voting machine hacking has been in the spotlight since researchers easily cracked multiple machines at the DEF CON conference in 2017 and 2018, security experts say websites are the easier mark for nation-state and other hackers breaking in remotely.

"There are a lot of soft targets, like state election commissions," Chien says. "Imagine them getting hacked and someone changes all of the polling information ... or leaks and wipes [data] or changes an address and you're not in the voter registration roll anymore."

Related Content:

Black Hat Europe returns to London Dec 3-6 2018 with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
poppynewton
50%
50%
poppynewton,
User Rank: Apprentice
9/20/2018 | 10:50:26 AM
comment
Thank you
97% of Americans Can't Ace a Basic Security Test
Steve Zurier, Contributing Writer,  5/20/2019
How Security Vendors Can Address the Cybersecurity Talent Shortage
Rob Rashotte, VP of Global Training and Technical Field Enablement at Fortinet,  5/24/2019
TeamViewer Admits Breach from 2016
Dark Reading Staff 5/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-7068
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7069
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7070
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7071
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
CVE-2019-7072
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .