`


THERE IS NO GOD EXCEPT ALLAH
read:
MALAYSIA Tanah Tumpah Darahku

LOVE MALAYSIA!!!


Sunday, November 11, 2018

Julau PKR ‘cyber attack’: Zuraida challenges JPP to show log files


PKR POLLS | Incumbent PKR Wanita chief Zuraida Kamaruddin has urged the party’s election committee (JPP) to divulge the log files for the computer tablets that were allegedly compromised during the Julau PKR election yesterday.
“It is very easy to trace who ‘hacked’ or tampered with the system. It has to be a JPP administrator who has the password to access the system.
“Each time this person enters the system, the information of the ‘event’ is recorded in the system’s log file. (JPP head) Rashid Din must reveal to us the information in this log file,” she said in a statement last night.
She said Rashid must reveal this information as soon as possible to prevent mistrust in the election system and rumour-mongering.
The Julau PKR election was suspended after deputy president candidate Rafizi Ramli claimed that a person was caught “tampering” with the tablets.
Rafizi claimed that a software known as “Prey” was installed in the tablets and that it was a “malware” (malicious software).
As explained by information security expert Keith Rozario, Prey was not a malware but a well established anti-theft software which companies used to protect their devices.
In her statement, Zuraida acknowledged this fact as well and stressed that it had to be installed by a JPP member with access to the devices.
“Prey is meant to protect information on phone, tablet or computer so that in case it is stolen, you can monitor where it is once it goes online. You can lock the system or delete information so that they won't be stolen.
“It is a software used to protect, not steal, information as alleged by Rashid.
“Not anyone can do this. JPP has to take full responsibility as only someone from JPP who has a password can access the tablet and download software. This can easily be traced and JPP must reveal who did this,” she said.
She also urged the JPP to offer the relevant log files for public scrutiny. - Mkini

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.