Electronic voting machine vendors should make their source code available for scrutiny by state elections officials, the head of a federal voting commission said Tuesday.
DeForest Soaries, chairman of the Election Assistance Commission, or EAC, said disclosing the source code--the line-by-line instructions that make up an electronic voting machine's software--would help to restore public trust in the elections process. Vendors should not "have the right to keep this source code a secret," Soaries told a dinner gathering of Maryland election officials.
IT professionals and their businesses have learned the hard way in recent years that disaster can strike at anytime and that they must be prepared. Companies unable to resume operations within ten days of a disaster hit are not likely to survive, stated a study from the Strategic Research Institute. In an attempt of protection, upwards of 60-70 percent of companies begin a disaster recovery plan, but never finish due to the overwhelming and complexity of plans or they gets put on the back burner.
A vulnerability in the Oracle's E-Business Suite allows a remote
attacker to execute arbitrary script on a vulnerable database system.
Exploitation may lead to compromise of the database application, data
integrity, or underlying operating system.
Oracle E-Business Suite is a set of applications and modules that
enables an organization to manage customer interactions, deliver
services, manufacture products, ship orders, collect payments, and
other tasks using a single database model.
During its special on computer attacks on June 3, the Dutch current-affairs programme, Zembla, demonstrated to television viewers just how easy it is to break into wi-fi networks and gain access to confidential information.
The networks found to be lacking in security were operated by the Dutch airline, KLM, and the Ministry for Public Works and Water Management (Rijkswaterstaat).
At Amsterdam?s Schiphol Airport, Zembla uncovered 15 security breaches in KLM?s wireless computer-connections in the arrival and departure halls, and at its office in Schiphol Oost.
Typing your password or credit card number into a computer is a moment's work. But if you think your personal details disappear as soon as you hit the Return key, think again: they can sit on the computer's hard disk for years waiting for a hacker to rip them off.
They hope their results will convince programmers to work harder at making computers more secure.