Close Menu
    Facebook LinkedIn YouTube WhatsApp X (Twitter) Pinterest
    Trending
    • Portable water filter provides safe drinking water from any source
    • MAGA Is Increasingly Convinced the Trump Assassination Attempt Was Staged
    • NCAA seeks faster trial over DraftKings disputed March Madness branding case
    • AI Trusted Less Than Social Media and Airlines, With Grok Placing Last, Survey Says
    • Extragalactic Archaeology tells the ‘life story’ of a whole galaxy
    • Swedish semiconductor startup AlixLabs closes €15 million Series A to scale atomic-level etching technology
    • Republican Mutiny Sinks Trump’s Push to Extend Warrantless Surveillance
    • Yocha Dehe slams Vallejo Council over rushed casino deal approval process
    Facebook LinkedIn WhatsApp
    Times FeaturedTimes Featured
    Saturday, April 18
    • Home
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    • More
      • AI
      • Robotics
      • Industries
      • Global
    Times FeaturedTimes Featured
    Home»News»Systems used by courts and governments across the US riddled with vulnerabilities
    News

    Systems used by courts and governments across the US riddled with vulnerabilities

    Editor Times FeaturedBy Editor Times FeaturedSeptember 30, 2024No Comments5 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp Copy Link


    Getty Photographs

    Public information methods that courts and governments depend on to handle voter registrations and authorized filings have been riddled with vulnerabilities that made it potential for attackers to falsify registration databases and add, delete, or modify official paperwork.

    Over the previous yr, software program developer turned safety researcher Jason Parker has discovered and reported dozens of crucial vulnerabilities in no fewer than 19 business platforms utilized by tons of of courts, authorities businesses, and police departments throughout the nation. A lot of the vulnerabilities had been crucial.

    One flaw he uncovered within the voter registration cancellation portal for the state of Georgia, as an illustration, allowed anybody visiting it to cancel the registration of any voter in that state when the customer knew the title, birthdate, and county of residence of the voter. In one other case, doc administration methods utilized in native courthouses throughout the nation contained a number of flaws that allowed unauthorized folks to entry delicate filings comparable to psychiatric evaluations that had been below seal. And in a single case, unauthorized folks might assign themselves privileges which can be purported to be out there solely to clerks of the courtroom and, from there, create, delete, or modify filings.

    Failing on the most elementary stage

    It’s arduous to overstate the crucial position these methods play within the administration of justice, voting rights, and different integral authorities features. The variety of vulnerabilities—largely stemming from weak permission controls, poor validation of consumer inputs, and defective authentication processes—show a scarcity of due care in guaranteeing the trustworthiness of the methods hundreds of thousands of residents depend on daily.

    “These platforms are supposed to make sure transparency and equity, however are failing on the most elementary stage of cybersecurity,” Parker wrote just lately in a post he penned in an try to lift consciousness. “If a voter’s registration may be canceled with little effort and confidential authorized filings may be accessed by unauthorized customers, what does it imply for the integrity of those methods?”

    The vulnerability within the Georgia voter registration database, as an illustration, lacked any type of automated technique to reject cancellation requests that omitted required voter info. As an alternative of flagging such requests, the system processed it with out even flagging it. Equally, the Granicus GovQA platform tons of of presidency businesses use to handle public information could possibly be hacked to reset passwords and acquire entry to usernames and e-mail addresses just by barely modifying the Internet handle exhibiting in a browser window.

    And a vulnerability within the Thomson Reuters’ C-Monitor eFiling system allowed attackers to raise their consumer standing to that of a courtroom administrator. Exploitation required nothing greater than manipulating sure fields in the course of the registration course of.

    There isn’t a indication that any of the vulnerabilities had been actively exploited.

    Phrase of the vulnerabilities comes 4 months after the invention of a malicious backdoor surreptitiously planted in a part of the JAVS Suite 8, an software bundle that 10,000 courtrooms all over the world use to report, play again, and handle audio and video from authorized proceedings. A consultant of the corporate mentioned Monday that an investigation carried out in cooperation with the Cybersecurity and Infrastructure Safety Company concluded that the malware was put in on solely two computer systems and didn’t end in any info being compromised. The consultant mentioned the malware was out there via a file a menace actor posted to the JAVS public advertising and marketing web site.

    Parker started analyzing the methods final yr as a software program developer purely on a voluntary foundation. He has labored with the Digital Frontier Basis to contact the system distributors and different events accountable for the platforms he has discovered susceptible. Up to now, all of the vulnerabilities he has reported have been fastened, in some circumstances solely up to now month. Extra just lately, Parker has taken a job as a safety researcher specializing in such platforms.

    “Fixing these points requires extra than simply patching just a few bugs,” Parker wrote. “It calls for an entire overhaul of how safety is dealt with in courtroom and public report methods. To forestall attackers from hijacking accounts or altering delicate knowledge, strong permission controls have to be instantly carried out, and stricter validation of consumer inputs enforced. Common safety audits and penetration testing needs to be customary follow, not an afterthought, and following the rules of Safe by Design needs to be an integral a part of any Software program Improvement Lifecycle.”

    The 19 affected platforms are:

    Parker is urging distributors and clients alike to shore up the safety of their methods by performing penetration testing and software program audits and coaching staff, significantly these in IT departments. He additionally mentioned that multifactor authentication needs to be universally out there for all such methods.

    “This sequence of disclosures is a wake-up name to all organizations that handle delicate public knowledge,” Parker wrote. “In the event that they fail to behave shortly, the results could possibly be devastating—not only for the establishments themselves however for the people whose privateness they’re sworn to guard. For now, the duty lies with the businesses and distributors behind these platforms to take instant motion, to shore up their defenses, and to revive belief within the methods that so many individuals rely upon.”



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Editor Times Featured
    • Website

    Related Posts

    NCAA seeks faster trial over DraftKings disputed March Madness branding case

    April 18, 2026

    Yocha Dehe slams Vallejo Council over rushed casino deal approval process

    April 18, 2026

    CFTC’s one-man show gets awkward on the Hill as lawmakers hammer Selig on sports bets, staffing gaps and corruption claims

    April 17, 2026

    Maryland session ends leaving sweepstakes gaming bills stalled once again as SGLA celebrates

    April 17, 2026

    New York lawsuit says Stake and Coinbase targeted child gambler for years

    April 17, 2026

    Recent advances push Big Tech closer to the Q-Day danger zone

    April 17, 2026

    Comments are closed.

    Editors Picks

    Portable water filter provides safe drinking water from any source

    April 18, 2026

    MAGA Is Increasingly Convinced the Trump Assassination Attempt Was Staged

    April 18, 2026

    NCAA seeks faster trial over DraftKings disputed March Madness branding case

    April 18, 2026

    AI Trusted Less Than Social Media and Airlines, With Grok Placing Last, Survey Says

    April 18, 2026
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    About Us
    About Us

    Welcome to Times Featured, an AI-driven entrepreneurship growth engine that is transforming the future of work, bridging the digital divide and encouraging younger community inclusion in the 4th Industrial Revolution, and nurturing new market leaders.

    Empowering the growth of profiles, leaders, entrepreneurs businesses, and startups on international landscape.

    Asia-Middle East-Europe-North America-Australia-Africa

    Facebook LinkedIn WhatsApp
    Featured Picks

    Today’s NYT Connections: Sports Edition Hints, Answers for Aug. 12 #323

    August 12, 2025

    Google unveils Gemini AI features, like select to search, for Chromebook Plus laptops like Lenovo’s new $649+ 14″ flagship with MediaTek’s Kompanio Ultra chip (Antonio G. Di Benedetto/The Verge)

    June 23, 2025

    Confusion Matrix Made Simple: Accuracy, Precision, Recall & F1-Score

    July 31, 2025
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    Copyright © 2024 Timesfeatured.com IP Limited. All Rights.
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.