article thumbnail

Georgia’s Ballot-Marking Devices

Schneier on Security

If Georgia had still been using the paperless touchscreen DRE voting machines that they used from 2003 to 2019, then there would have been no paper ballots to recount, and no way to disprove the allegations that the election was hacked. I have long advocated voter-verifiable paper ballots, and this is an example of why.

Paper 119
article thumbnail

Meet Ika & Sal: The Bulletproof Hosting Duo from Hell

Krebs on Security

For example, in 2010 Spamdot and its spam affiliate program Spamit were hacked, and its user database shows Sal and Icamis often accessed the forum from the same Internet address — usually from Cherepovets , an industrial town situated approximately 230 miles north of Moscow. And there were many good reasons to support this conclusion.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Declassified NSA Newsletters

Schneier on Security

Through a 2010 FOIA request (yes, it took that long), we have copies of the NSA’s KRYPTOS Society Newsletter, “ Tales of the Krypt ,” from 1994 to 2003. For example in discussing a small-exponent attack on RSA, he says “an attack by Michael Wiener will recover e when e is up to one quarter the size of n.”

FOIA 106
article thumbnail

On Software Liabilities

Schneier on Security

Expanding on the idea of building codes for building code, Section 4 shows some examples of product-focused standards from other fields. In 2003, I wrote : Clearly this isn’t all or nothing. They focus on process, while a liability regime should begin with a focus on the product—­that is, on outcomes.

Paper 98
article thumbnail

UK govt contractor MPD FM leaks employee passport data

Security Affairs

Established in 2003, the company has expanded to house 500 staff. For example, malicious actors could create fake accounts impersonating victims and make unauthorized transactions. MPD FM boasts of being the UK’s leading “facility management company.”

Retail 92
article thumbnail

In an Eagerly Anticipated Decision, the Ninth Circuit Sides With Web Scrapers

Data Matters

He also expressed “deep[] concern[]” about allowing website operators to pick and choose who is allowed to visit their public site, suggesting that such an interpretation of the CFAA would, for example, allow companies to prevent competitors from visiting their site to learn about products or pricing. See, for example, Intel v.

Access 68
article thumbnail

What is vegetation management? 

IBM Big Data Hub

The 2003 blackout mentioned earlier wasn’t an isolated case; in some regions, vegetation causes up to half of the power outages, and in the US, this figure reaches as high as 92% , as reported by the Federal Energy Commission. Vegetation overgrowth affects many industries and requires proactive management.