{"id":13113,"date":"2022-06-01T04:32:18","date_gmt":"2022-06-01T02:32:18","guid":{"rendered":"https:\/\/www.show.it\/cyber-agency-voting-software-vulnerable-in-some-states\/"},"modified":"2022-06-01T04:32:18","modified_gmt":"2022-06-01T02:32:18","slug":"cyber-agency-voting-software-vulnerable-in-some-states","status":"publish","type":"post","link":"https:\/\/www.show.it\/en\/cyber-agency-voting-software-vulnerable-in-some-states\/","title":{"rendered":"Cyber Agency: Voting Software Vulnerable in Some States"},"content":{"rendered":"<p><span><span><strong><span>Electronic voting machines from a leading vendor used in at least 16 states have <a href=\"https:\/\/www.securityweek.com\/experts-false-claims-voting-machines-obscure-real-flaws\">software vulnerabilities <\/a>that leave them susceptible to hacking if unaddressed, the nation\u2019s leading cybersecurity agency says in an advisory sent to state election officials.<\/span><\/strong><\/span><\/span><\/p>\n<p><a href=\"https:\/\/www.securityweek.com\/cyber-agency-voting-software-vulnerable-some-states\" target=\"_blank\" rel=\"noopener\">read more<\/a><\/p>\n<div class=\"feedflare\">\n<a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=LCqFQ-KjXzY:tYTa9-5X3Jw:yIl2AUoC8zA\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?d=yIl2AUoC8zA\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=LCqFQ-KjXzY:tYTa9-5X3Jw:-BTjWOF_DHI\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?i=LCqFQ-KjXzY:tYTa9-5X3Jw:-BTjWOF_DHI\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=LCqFQ-KjXzY:tYTa9-5X3Jw:dnMXMwOfBR0\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?d=dnMXMwOfBR0\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=LCqFQ-KjXzY:tYTa9-5X3Jw:V_sGLiPBpWU\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?i=LCqFQ-KjXzY:tYTa9-5X3Jw:V_sGLiPBpWU\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=LCqFQ-KjXzY:tYTa9-5X3Jw:qj6IDK7rITs\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?d=qj6IDK7rITs\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=LCqFQ-KjXzY:tYTa9-5X3Jw:gIN9vFwOqvQ\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?i=LCqFQ-KjXzY:tYTa9-5X3Jw:gIN9vFwOqvQ\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=LCqFQ-KjXzY:tYTa9-5X3Jw:TzevzKxY174\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?d=TzevzKxY174\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=LCqFQ-KjXzY:tYTa9-5X3Jw:F7zBnMyn0Lo\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?i=LCqFQ-KjXzY:tYTa9-5X3Jw:F7zBnMyn0Lo\" border=\"0\"><\/a>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Electronic voting machines from a leading vendor used in at least 16 states have software vulnerabilities that leave them susceptible to hacking if unaddressed, the nation\u2019s leading cybersecurity agency says in an advisory sent to state election officials. read more<\/p>\n","protected":false},"author":2,"featured_media":13114,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[28,11],"tags":[],"class_list":["post-13113","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberwarfare","category-news-industry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/posts\/13113","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/comments?post=13113"}],"version-history":[{"count":0,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/posts\/13113\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/media\/13114"}],"wp:attachment":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/media?parent=13113"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/categories?post=13113"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/tags?post=13113"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}