"As more governments turn to contact tracing apps to aid in their efforts to contain the coronavirus outbreak, cybersecurity experts are warning this may spark renewed interest in Bluetooth attacks. They urge developers to ensure such apps are regularly tested for vulnerabilities and release patches swiftly to plug potential holes, while governments should provide assurance that their databases are secure and the data collected will not be used for purposes other than as originally intended. "
"Some are disturbed by the strategy to go "digital by default". Andrew Miller, chair of the Commons science and technology committee, wrote to Cabinet Office minister Francis Maude with concerns that "as public services go online, the government may not keep up with advances in technology and that inadequacies in government software may lead to security vulnerabilities"."
"The first and most obvious explanation for older internet users' increased vulnerability to misinformation is the effect of aging on the brain. A huge body of research has demonstrated that the same factors that make older Americans susceptible to financial scams - lower impulse control, slower cognitive function, higher rates of social isolation - also make them vulnerable to misinformation. "
"And these machines' vulnerabilities to hacking are "terrifying", Sarah Teale, co-director along with Simon Ardizzone and Russell Michaels, told the Guardian. America's current election infrastructure is, as Kill Chain explains, a prescription for disaster - an outdated, willfully naive system no more prepared for attack than four years ago."
"Cybersecurity experts have warned for years that malfeasance, technical breakdown or administrative incompetence could easily wreak havoc with electronic systems and could go largely or wholly undetected. This is a concern made much more urgent by Russia's cyber-attacks on political party servers and state voter registration databases in 2016 and by the risk of a repeat - or worse - in this November's midterms.
"
"The NSA's AURORAGOLD program -- revealed in newly released Snowden docs -- used plundered internal emails to compromise nearly every mobile carrier in the world, and show that the agency had planned to introduce vulnerabilities into future improvements into mobile security. "