Thursday, September 26, 2019

In Call To Ukraine S President Trump Revived A Favorite Conspiracy Theory About The Dnc Hack

What We Know About CrowdStrike, The Cybersecurity Firm Trump Mentioned In Ukraine Call, And Its Billionaire CEO

In a reconstructed transcript released by the White House on Wednesday morning of a phone call between President Donald Trump and Ukrainian president Volodymyr Zelensky from July 25, Trump asked Zelensky for a "favor" and to "find out what happened with this whole situation with Ukraine," then ended the sentence with mention of CrowdStrike, a cloud-based cybersecurity firm.

According to the formal whistleblower complaint, Trump is mentioning CrowdStrike due to rumors that during the firm's investigation into the DNC hack, it had mishandled the DNC's servers. Further, Trump believed the servers are now apparently somewhere in Ukraine. Videos for In Call To Ukraine S President Trump 2:03 Trump asked Ukraine president to look into Biden: call summary REUTERS Trump allegedly wanted Zelensky to locate the servers and turn them over to the U.S. government.

Publisher: Forbes
Date: 2019-09-25
Author: Angel Au Yeung
Twitter: @forbes
Reference: Visit Source



While you're here, how about this:


Codebook - September 26, 2019 - ... ... toggle main ... toggle complementary ... on ... on ... on ... permalink to your ... on ... on ... on ... permalink to your ... on ... on ... on ... permalink to your ... on ... on ... on ... permalink to your ... on ... on ... on ... permalink to your clipboard

Welcome to Codebook, the most fascinating cybersecurity newsletter in the most fascinating timeline.

* * *

Last week, Senate Majority Leader Mitch McConnell offered his support for a $250 million election security fund. By experts' estimates, that's only around 10% of what states will need between now and 2024 in order to protect elections from security threats.

* * *

This isn't just a voting machine issue: The public debate about election security often gets falsely reduced to swapping out machines without paper ballots for machines with them.

logo
Publisher: Axios
Twitter: @axios
Reference: Visit Source



<main><p class="featured" style="display:block; margin:20px 0;"><img src="https://content.fortune.com/wp-content/uploads/2019/08/GettyImages-821567522-e1567168084951.jpg?resize=1200,600" alt="" style="max-width:100%;height:auto;" onerror="this.src='data:image/gif;base64,R0lGODlhAQABAIAAAAAAAAAAACH5BAEAAAAALAAAAAABAAEAAAICRAEAOw==';" /></p> <p><p><em>This is the web version of Data Sheet, Fortune's daily newsletter on the top tech news. To get it delivered daily to your in-box, </em><a href="https://news.jill9.com/teleport/https://news.jill9.com/teleport/https://cloud.newsletters.fortune.com/fortune/nloptin?nl=DATA_SHEET"><em>sign up here</em></a><em>.</em></p></p> <p><p>It is an article of faith in the cybersecurity community, but not yet in the real world, that computer networks can never be completely defended. Criminal (or state-sponsored) hackers will get in if they want to. The trick, then, is what to do next.</p></p> <p><p>Marten Mickos, the Finnish <a href="https://news.jill9.com/teleport/https://news.jill9.com/teleport/https://fortune.com/2015/11/11/serial-ceo-marten-at-hackerone/">open-source software entrepreneur</a> responsible for MySQL, a generation-ago business software success now owned by <a href="https://news.jill9.com/teleport/https://news.jill9.com/teleport/https://fortune.com/fortune500/oracle-77/" target="_blank">Oracle</a>, sees cyber threats as one of the two great global crises, along with climate change. He runs a San Francisco "bug-bounty" company called HackerOne. It hires "white hat" hackers to break into the networks of HackerOne's 1,400 or so corporate and government clients. <span class="snip">2:24 Trump insists he did nothing wrong in phone call with Ukraine president ABC News </span> From a computer perspective, it'd be like hiring a commando to breach the perimeter of a campus to gain insight into what holes a thief would see. </p></p> </main> <div> <div><b>Publisher: </b>Fortune</div> <div><b>Reference: </b><a href="https://news.jill9.com/teleport/https://news.jill9.com/teleport/https://fortune.com/2019/08/30/hackerone-bug-bounty-mickos/" title="">Visit Source</a></div> </div> <br /><br /><br /> <h2><title>First in MC: DEF CON reveals election security findings - POLITICO

The DEF CON Voting Village uncovered security gaps in electronic voting machines, and detailed them in its 2019 report.

* * *

HAPPY THURSDAY and welcome to Morning Cybersecurity! It's a weird tradition we have here. Send your thoughts, feedback and especially tips to tstarks@politico.com. Be sure to follow @POLITICOPro and @MorningCybersec. Full team info below.

logo
Publisher: POLITICO
Twitter: @politico
Reference: Visit Source



Happening on Twitter

No comments:

Post a Comment

Featured Post

Elizabeth Taylor Inspired Me

⁘We were actually supposed to meet up for tea at her house, and then she fell ill,⁘ Kardashian ...

Popular Posts