Def Con Voting Machine Hacks Ruffle Feathers

TechNewsWorld,  August 14, 2018:   https://www.technewsworld.com/story/85505.html


"Hackers cracked into a wide array of voting equipment Def Con's Voting Village, an event held Friday at Caesar's Palace in Las Vegas, Nevada. Last year, conference goers hacked five machines and an e-poll book of registered voters. This year, in addition to voting machines, tabulators and smart card readers were available for hacking. Websites weren't off limits, either." 


---------------------------------------------------------------------------------------------------

The Two Sides of the Artificial Intelligence Coin

E-Commerce Times, August 16, 2018:  https://www.ecommercetimes.com/story/85512.html?


"AI for years has been a staple of science fiction -- from the starship Enterprise's talking computer in Star Trek in the 1960s, to the bionic Steve Austin in The Six Million Dollar Man in the 1970s, to Arnold Schwarzenegger's time-traveling killer robot in the Terminator movies of the 1980s, to give just a few examples. Now AI has moved beyond sci-fi and become real, with all sorts of technologies. We are already using AI in many different ways. We use it when we call a company for customer service and talk to a computer, example. We use it when we log onto a chat system and type our questions and get a response from a computer system rather than an individual. There are countless other ways AI is in common use today, and more applications are coming online all the time.  IBM's Watson blew us away in 2011 when it played the TV game show Jeopardy! Back then, AI was still new, and few knew much about it. In the years since, companies in every industry have been using AI technology to improve the way they do business.  There are two sides to the AI coin. On one side are all the technological advancements that will improve our lives. On the other side are breaches in privacy and security. Consider Google's Assistant, Amazon's Alexa, Apple's Siri, Microsoft's Cortana, Samsung's Bixby, and all the new players that are entering the AI space on a regular basis. They can not only listen to and record things people say, but also make educated guesses about what people think."




 ______________________________________________________________________


Homeland Security starts with Hometown Security

(https://www.dhs.gov/topic/critical-infrastructure-security)


"DHS provides free tools and resources to communities because the Department recognizes that communities are the first line of defense in keeping the public safe and secure. The Department encourages businesses to Connect, Plan, Train, and Report. Applying these four steps in advance of an incident or attack can help better prepare businesses and their employees to proactively think about the role they play in the safety and security of their businesses and communities." DHS states:


"CONNECT: Reach out and develop relationships in your community, including local law enforcement. Having these relationships established before an incident occurs can help speed up the response when something happens. 

PLAN: Take the time now to plan on how you will handle a security event should one occur. Learn from other events to inform your plans. 

TRAIN: Provide your employees with training resources and exercise your plans often. The best laid plans must be exercised in order to be effective.  

REPORT:  'If You See Something, Say Something™” is more than just a slogan. Call local law enforcement.' " 


------------------------------------------------------------------------------------

 




dmgroth@laetarecyber.com


Securing America's Critical Infrastructures for Mid-Atlantic Small Businesses

LAETARE CYBERSECURITY, LLC

443-844-9149