Skip Navigation
BlackBerry Blog

Hacking Elections is Easy!

NEWS / 08.14.17 / The Cylance Team

Ever since news broke that hackers at the DEFCON 'Voter Village' were able to exploit vulnerabilities in voting machines in under 90 minutes, the Institute for Critical Infrastructure Technology (ICIT) has been flooded with requests for access to its research on the topic of hacking elections, election system integrity, and Russian election tampering.

Below are links to ICIT publications which may make your research easier if you are looking into this topic:

Clearly, the system we base our democracy on is far from secure when it comes to the voting machines used today. Cylance has recently been at the forefront of research regarding these systems. Some of our current research (including specific compromises on Sequoia Voting machines) can be found here:

We need more efforts like Voter Hacking Village, which allow security researchers and engineers full access to these systems in a controlled environment. Too often, researchers are seen as “the bad guys” who should be kept as far away as possible from these machines, but in fact the opposite should be true.

These researchers are the ones who understand exactly how a malicious attacker might go about breaking into our voting systems. If we are to preserve the integrity of our current election setup, researchers should be at the front lines of these systems, right alongside the manufacturers, locking shields to prevent future breaches of data and trust. 

Manufacturers and the information security industry should be banding together to help America become a more secure nation. The general public needs to trust that our voting infrastructure is as secure as it can possibly be, if we’re hoping to avoid future news stories about election hacking that undermine our sense of security as a nation.  

The Cylance Team

About The Cylance Team

Our mission: to protect every computer, user, and thing under the sun.

Cylance’s mission is to protect every computer, user, and thing under the sun. That's why we offer a variety of great tools and resources to help you make better-informed security decisions.