Major security flaw in Switzerland's online voting system could allow 'vote manipulation' without detection

clock
Researchers have discovered a critical cryptographic flaw in Swiss e-voting system. Image via Pixabay
Image:

Researchers have discovered a critical cryptographic flaw in Swiss e-voting system. Image via Pixabay

E-voting security weakness lies in the way encrypted e-votes are 'shuffled' to protect voter privacy

Security researchers have discovered a critical security flaw in Switzerland's e-voting system, which could enable hackers to manipulate votes cast, without ever being detected by the authorities. After...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

More on Security

Nitrado chooses G-Core Labs to scale its IT infrastructure internationally

Nitrado chooses G-Core Labs to scale its IT infrastructure internationally

G-Core Labs has created infrastructure solutions for international game server hosting company Nitrado, allowing the company to scale its computing power.

clock 26 May 2022 • 2 min read
Russian hackers behind new Brexit leak website, Google says

Russian hackers behind new Brexit leak website, says Google

A new website that recently published leaked emails, allegedly from key pro-Brexit individuals, has links to Russian hackers, according to Google.

clock 26 May 2022 • 3 min read
PyPI package 'ctx' and PHP library 'phpass' hijacked to obtain AWS keys

PyPI package 'ctx' and PHP library 'phpass' hijacked to obtain AWS keys

Both attacks appears to be the work of the same actor

clock 25 May 2022 • 3 min read