A new study commissioned by the Maryland legislature states that electronic voting machines bought by the state from Diebold for $55 million have such poor software and physical security that an election could be disrupted or even stolen, according to the New York Times. The study represents the first hands-on effort to hack these machines under conditions found in an election. The team, from consulting firm RABA Technologies in Columbia, MD, did say that the weaknesses could be addressed–at least preliminarily–in time for the state’s primary elections in March.
This is only one in a series of reports attacking the security of electronic voting machines, particularly those manufactured by Diebold Election Systems. Diebold’s machines are used statewide in Georgia as well as in several populous counties in Califonia, Texas, and Ohio. Stanford computer scientist David Dill, who is among the security experts asking for more stringent regulation of this new technology, explains his concerns in this TR interview.
DeepMind’s cofounder: Generative AI is just a phase. What’s next is interactive AI.
“This is a profound moment in the history of technology,” says Mustafa Suleyman.
What to know about this autumn’s covid vaccines
New variants will pose a challenge, but early signs suggest the shots will still boost antibody responses.
Human-plus-AI solutions mitigate security threats
With the right human oversight, emerging technologies like artificial intelligence can help keep business and customer data secure
Next slide, please: A brief history of the corporate presentation
From million-dollar slide shows to Steve Jobs’s introduction of the iPhone, a bit of show business never hurt plain old business.
Get the latest updates from
MIT Technology Review
Discover special offers, top stories, upcoming events, and more.