As ten of millions of Americans already have cast their votes, voting-machine cybersecurity and disinformation questions haunt 2020 election campaigns up and down the ballot.
At Chaos Communication Congress, election security expert J. Alex Halderman describes the United States’ rough yet vital road toward securing its many vulnerable voting systems.
High midterm voter turnout highlighted vulnerabilities in dated voting systems. But new machines aren’t the ticket to a smoother and more secure presidential election, experts say.
At the Context Conversations event on election security, veteran software engineer Ben Adida explains how he plans to “build open-source voting machines on commodity hardware.”
In a column for The Parallax, Gary McGraw outlines why his band wrote a song that passionately encourages every eligible voter to fill out and submit a ballot.
Despite knowing that current voting systems are highly vulnerable, lawmakers’ inaction on providing badly needed funding for updates has thus far resulted in maintaining the status quo.
Ensuring the integrity and security of a ballot submitted from overseas has long been challenging, and only 7 percent of eligible voters even attempt it. Can technology help?
At our second event, on November 5, we’ll discuss voting-machine vulnerabilities, effective social-engineering tactics, and how to secure elections while respecting democratic values.
California Secretary of State Alex Padilla discusses the importance of preventing (and addressing) system breaches alongside misinformation campaigns. There’s a lot to balance.
Registration, tabulation, social media—there are other aspects of elections we need to better secure, say experts who examined eight notoriously insecure Winvote machines.
Privacy and online-rights advocates say Spain’s recent heavy-handed Internet control is unprecedented for a Western democracy—and it could return with this week’s snap election.
Addressing EVM vulnerabilities uncovered at DefCon—and plugging related holes across disparate election systems—would require years of concentrated work, experts say.
During a fireside chat in Las Vegas, Reps. Will Hurd of Texas and Jim Langevin of Rhode Island plead for proactive hacker-lawmaker collaboration and voice concerns about election security.
The social-networking giant’s chief security officer sounds off on why and how political campaigns should work together to fight attacks on their critical infrastructure and information.
After a presidential election marked by hacks and leaks and claims of “bleak” urban streets, those of the nation’s capital were filled—quite literally—with anger and worry. And hope.
Will Trump be able to fill key positions? Will he heed warnings about Russia? Will he look to force tech companies to create encryption backdoors? Here’s what several experts tell us.
Properly protected vote databases are tough to hack, security experts say. But in places lacking up-to-date software, proper IT training, or a paper trail, hackers have an advantage.
As you install any app, be cautious about the data you share with its publishers and might expose to eavesdroppers. Here’s what to look out for this election season and beyond.
Tech issues may be too complex—and too lacking of simple populist messages—to argue about on stage. But the candidates have their opinions. Here’s an overview.