Feeds

Hacking probe clouds Swedish election result

Shocking viking hacking

Internet Security Threat Report 2014

Hi-tech scandal cast its shadow over last weekend's Swedish elections after the incumbent Social Democratic Party accused its political rivals, the Liberal party, of hacking into its systems. The Social Democrats reckons that "someone linked to the Liberal Party" broke into its internal network to swipe election strategy information, Dagens Industri via AFX reports. Police have been asked to investigate the source of "hundreds of incidents" of unauthorised access, following complaints from the Social Democrats.

"Our computer systems have been illegally accessed. It was wide scale, systematic and has been going on for a long time," Social Democrat party treasurer Tommy Ohlstroem, said at a press conference ahead of the elections. The Liberal Party, part of the opposition centre right alliance which scored a narrow victory in Sunday's poll, said it would mount a technical investigation into the source of the suspected hack.

Meanwhile centre-right leader Fredrik Reinfedlt is in the process of establishing a new four-party co-coalition government after ending 12 years of Social Democrat rule with promises to cut taxes and trim welfare spending. Reinfeldt, 41, takes over the reins from prime minister Social Democrat leader Goran Persson, 57, after his Moderate Party-led coalition claimed 48.1 per cent of votes cast on Sunday against a 46.2 per cent share for the Social Democrats and its allies. The vote was enough to secure centre-right parties 178 seats in Sweden's 349-seat parliament, a small but workable majority of seven seats. ®

Internet Security Threat Report 2014

More from The Register

next story
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.