Security Flaws Apparent in the Affordable Care Act Site

healthcareAccording to an article from the Christian Science Monitor, cybersecurity experts have noticed “red flags” about the security of the Obamacare site, This security flaw, coupled with the myriad bugs and glitches on the site, adds to the frustration and confusion that has been plaguing users for the last few weeks.

While the glitches and bugs may be frustrating, they are not nearly of as much concern as the security flaws. CSM points out that cybersecurity professionals brought up several red flags on the site that could allow for theft of personal information. Though not yet considered “vulnerabilities,” or of serious concern, the flaws should still be taken seriously.

The article in the Christian Science Monitor suggests that security flaws could allow hackers to “spoof” the website with a look-a-like site to acquire users’ information. The site also stores cookies, or personal data users have entered, which hackers could get access to. Another security flaw includes the ability for hackers to use an automated program to try to repeatedly enter the site.

Other security flaws include verification (the health insurance program doesn’t run off a single site, but rather a collection of sites where people can register) and login fraud, which would allow hackers to use automated systems to break into individual accounts. On the verification front, CSM suggests that because users will have so many different site options for health coverage, they could easily be tricked into thinking a site is legitimate when it is not.

For more information, visit:

Posted by Jamie Friedlander on Oct 16, 2013

  • Approaching the Education Market with Milestone Approaching the Education Market with Milestone

    Milestone’s Laurie Dickson addresses Open Architecture, new equipment and the cost of entry and upgrading VMS systems over time. She also talks about how K-12 and Higher Education campuses differ in regard to surveillance system needs. Schools have certain guidelines they must follow to protect student identities, and Laurie addresses this question as well.

Digital Edition

  • Security Today Magazine - January February 2022

    January / February 2022


    • A Power User
    • The Benefits of Transformation
    • Cloud Storage Training
    • Popular Access Control
    • Where Solar and Security Meet

    View This Issue

  • Environmental Protection
  • Occupational Health & Safety
  • Infrastructure Solutions Group
  • Spaces4Learning
  • Campus Security & Life Safety