Image Credit: @tjhorner
Today, election hacking is not just about hacking voting machines, rather it now also includes hacking and leaking dirty secrets of the targeted political parties—and there won’t be a perfect example than the last year’s US presidential election.
But, in countries like America, even hacking electronic voting machines is possible—that too, in a matter of minutes.
Posted in def con hacking conference, election hacking, electronic voting machine, hacking competition, hacking voting machine, voting machine | Comments (0)
Why we can’t detect all security loopholes and patch them before hackers exploit them?
Because… we know that humans are too slow at finding and fixing security bugs, which is why vulnerabilities like Heartbleed, POODLE and GHOST remained undetected for decades and rendered almost half of the Internet vulnerable to theft by the time patches were rolled out.
Now to solve this hurdle, DARPA
Posted in automated penetration testing, capture the flag, DARPA, def con hacking conference, hacking competition, hacking conference, Penetration testing tools, vulnerability assessment, vulnerability assessment tools | Comments (0)