Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Voter Databases Do a Lousy Job at Securing Personal Data

Voter Databases Do a Lousy Job at Securing Personal Data

Hackers are known to go after data of all kinds, but sometimes they have other goals in mind. With one of the biggest events in world politics fast approaching--the 2016 United States presidential election--it’s thought that this event could potentially be influenced by hackers.

Backed by apparent evidence of a data breach within the Democratic National Committee, as well as at least two state election databases, how does this argument hold water?

The two hacked databases stored voter registration information for the citizens of Illinois and Arizona. The Illinois attack leaked the personal data of 200,000 voters over the course of 10 days. The Arizona attack, however, was unsuccessful. What’s unclear about these attacks is whether or not they are related in some way to other high-profile attacks against political groups.

As reported by CIO: “According to the FBI’s alert, ‘an unknown actor’ attacked a state election database by using widely available penetration testing tools, including Acunetix, SQLMap, and DirBuster. The hackers then found an SQL injection vulnerability--a common attack point in websites--and exploited it to steal the data. The FBI has traced the attacks to eight IP addresses, which appear to be hosted from companies based in Bulgaria, the Netherlands, and Russia.”

This election season has been a major center of controversy, as there are claims of election fraud pouring in from all over the United States, as well as unfounded claims that the election may be “rigged.” In particular, it’s thought that this “voter fraud” stems from claims that voter registration databases were altered prior to state primary elections. Earlier this year, the United States formally accused Russia of being behind the hacks on the Democratic National Committee. And, of course, you can’t forget about all of the “experts” on social media who claim that the system is rigged, which attribute to the fears that the election will be influenced by foreign entities.

However, Homeland Security Secretary Jeh Johnson issued a statement regarding these fears: Homeland Security was not aware of “specific or credible cybersecurity threats” that could affect the election. Yet, these reassurances do little to mitigate the fact that these systems were infiltrated and accessed.

It just goes to show that even big targets can fall victim to hackers when their infrastructures aren’t prepared to deal with threats. If major political entities can become the victim of a cyber attack, just imagine what hackers could do to your own business. We want you to know that even companies that don’t seem to hold sensitive data can retain information useful to hackers, like credit card numbers or employee personal records.

To learn how your business can protect its data, reach out to Evolve IT at (518) 203-2110.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Business Malware Business Computing Software User Tips Efficiency Workplace Tips Computer Google Hosted Solutions Microsoft Upgrade IT Support Mobile Devices Innovation Smartphone Windows 10 Hardware Network Security Ransomware Gmail Operating System Microsoft Office Office Backup The Internet of Things Apps Social Media Business Continuity Bandwidth Disaster Recovery Communication Hacking WiFi Facebook Wireless Technology Android Apple Firewall Smartphones Content Filtering Cybercrime Best Practice Website Alert Networking Data storage Data Windows Experience Employer-Employee Relationship Two-factor Authentication History Small Business Phishing Money Mobile Device Management App Network Mobile Computing Big Data communications Managed Service Provider Outlook Safety Unified Threat Management Quick Tips Compliance End of Support Government Tech Support Drones Augmented Reality Keyboard Search Social User Hard Drives Browser Writing Printer Remote Computing Virtual Desktop Shortcut Wireless DDoS Unified Communications Securty Document Management Heating/Cooling Encryption Word Law Enforcement SaaS VoIP Proactive IT Retail Business Management Cortana Network Congestion Save Money Competition Music Presentation Managed IT services Entrepreneur Domains Laptop Cryptocurrency Hacker Bluetooth IBM Google Docs Education Holiday Automation Cleaning Application Black Market Customer Service YouTube Memory Processors Office Tips LiFi Staffing Downtime Deep Learning BYOD Passwords Streaming Media BDR Router Help Desk Micrsooft Office 365 Visible Light Communication Disaster Vendor Management Business Growth Analytics Data Management Saving Money Robot Lithium-ion battery Advertising Recovery intranet Sports Monitors Society Google Wallet Spam Information Technology Running Cable Social Networking Internet of Things Displays Windows 8 Public Speaking Hosted Solution IP Address Windows XP Virtualization IT Services Artificial Intelligence Documents
QR-Code