Government

Voting Machine Maker Defends Refusal of White-Hat Hacker Testing at DEF-CON

Voting machine maker Election Systems & Software (ES&S) defended its decision not to participate in a white-hat hacking event at this year’s DEF-CON to test the security of voting systems, saying such hack-a-thons could actually jeopardize election security and invite hackers to disrupt electronic voting systems.

North Korea’s Lazarus Tied to Cryptojacking Campaign Targeting MacOS

North Korean state-sponsored hacking group Lazarus is believed to be behind a recent crypto jacking attack on several banks with an unexpected twist–the use of a Trojan that tricked a company employee into downloading malware, according to Kaspersky Lab.

Podcast Episode 109: What’s The US Freedom Army? Ask Russia.

In this week’s episode of the Security Ledger Podcast (#109): what lurks in the dark recesses of online information operations? How about a secret “US Freedom Army” linked to Russia? Dave Aitel of Cyxtera joins us to talk about it. Also: hacking critical infrastructure isn’t just for nation states anymore. Cybereason joins us to talk about its recent report on cyber criminals hacking into industrial control systems. 

Stand up for Journalism: Our Most Important, Least Glamorous Profession

From the Mỹ Lai Massacre, to Love Canal to clergy sex abuse to the lead in Flint’s water, our awareness of urgent problems in our communities comes not from the West Wing or government officials (themselves elites) but from nosy, dogged and mostly under-compensated reporters doing their jobs and holding the powerful to account. 

Episode 107: What’s Hot at Black Hat & does DHS need its new Risk Management Center?

In this episode of The Security Ledger Podcast (#107): Hacker Summer Camp takes place in Las Vegas this week as the Black Hat, DEFCON and B-Sides conferences take place. We’re joined by DigiCert Chief Technology Officer Dan Timpson to talk about the presentations that are worth seeing. And, in our second segment, The Department of Homeland Security launched a new Risk Analysis Center that sounds a whole lot like some programs it already runs. Is this bureaucratic overkill or is DHS on to something?