I Bought a Voting Machine Online … Then Hacked It
Learn more at https://www.symantec.com/solutions/election-security
To demonstrate how vulnerable some of our digital election infrastructure really is, we bought two voting machines from an online auction site for less than $200. They were last used in State and Federal elections in 2012 and 2013. What vulnerabilities will we find?
Elections are under assault across the globe, as we continually see in the news. Well-resourced malicious cyber actors have tampered with our elections, whether it’s hacking voting machines or waging information warfare through social media.
Видео I Bought a Voting Machine Online … Then Hacked It канала Symantec
To demonstrate how vulnerable some of our digital election infrastructure really is, we bought two voting machines from an online auction site for less than $200. They were last used in State and Federal elections in 2012 and 2013. What vulnerabilities will we find?
Elections are under assault across the globe, as we continually see in the news. Well-resourced malicious cyber actors have tampered with our elections, whether it’s hacking voting machines or waging information warfare through social media.
Видео I Bought a Voting Machine Online … Then Hacked It канала Symantec
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Election Hacking - What Can We Do About It?Webinar - Symantec EDR UpdateWebinar - Symantec’s Global Intelligence Network: The Power Behind Symantec SecurityAn Overview of the Traffic Redirection feature of Symantec Endpoint Security (SES)Webinar - Shut the Door on RansomwareGetting Started with Symantec Endpoint Security (SES)An overview of the Adaptive Protection feature in Symantec Endpoint Security (SES)An Overview of Threat Intelligence Browser Plug-InWebinar - Level Your Risk with Risk LevelsWebinar - Stop Threats At the Wire with Symantec Intrusion PreventionContinuous Access Evaluation with Symantec DLP and IAMWebinar - Improving Network, Information & Endpoint SecurityWeb Protection: Application Visibility & ControlGetting Started with Endpoint Detection and Response (EDR)Webinar - Simplifying Endpoint Security across Protection, Detection and ResponseSymantec CloudSOC Mirror GatewayWebinar - Delivering Adaptive Access Controls for a Safer, SASE Cloud with CASBWebinar - Zero Trust Network Access: A Cornerstone for Data-Centric SASE