Remove 08
Remove 2010 Remove Authentication Remove Government Remove Military
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

Listen to EP 08: Hacking Voting Systems. In 2010, she was interviewed by O'Reilly Media. Vamosi: Bowen’s public inquiry revealed findings of multiple buffer overflows, software updates without authentication, and inadequate randomization of the ballots so that valid secrecy can be compromised -- among other vulnerabilities.

article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

Listen to EP 08: Hacking Voting Systems. In 2010, she was interviewed by O'Reilly Media. Vamosi: Bowen’s public inquiry revealed findings of multiple buffer overflows, software updates without authentication, and inadequate randomization of the ballots so that valid secrecy can be compromised -- among other vulnerabilities.

article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

Listen to EP 08: Hacking Voting Systems. In 2010, she was interviewed by O'Reilly Media. Vamosi: Bowen’s public inquiry revealed findings of multiple buffer overflows, software updates without authentication, and inadequate randomization of the ballots so that valid secrecy can be compromised -- among other vulnerabilities.