Trump is wrong about catching hackers, cyber security experts explain in 140 characters

On Monday morning, Donald Trump formally addressed the CIA's allegations that Russian hackers tried to interfere in the election on — where else? — Twitter and, as usual, got some basic facts wrong.

First, here's what the president-elect said that many are taking umbrage with.

 Donald J. Trump ✔ @realDonaldTrump
Unless you catch "hackers" in the act, it is very hard to determine who was doing the hacking. Why wasn't this brought up before election?
8:21 AM - 12 Dec 2016
15,866 Retweets 59,802 likes

Well, first of all, the threat of hacking interfering in the election was brought up before the election. Many times. Including by Trump himself. 

But, more importantly, Trump is very wrong about how hacking actually works so Mashable turned to cyber security experts for their responses to Trump in terms he'll understand: tweets.

Here's what they told us — and Trump — all in tweet-sized bites of 140 characters or less.

 Kellyanne Conway ✔ @KellyannePolls
@realDonaldTrump & I working hard tonight. Thank you for the privilege of a lifetime, #PEOTUS.
7:37 PM - 28 Nov 2016
  5,786  Retweets   17,826  likes

Steven Morgan, Cybersecurity Ventures:
Donald, you and Hillary can get trained by the world's most famous hacker and find out how hackers really get caught. Go here:

ValiMail CEO Alexander García-Tobar
 ValiMail @ValiMail
@realDonaldTrump Majority of hacks start w/ phish & you can catch hackers if you use email auth. Which you didn’t 
1:42 PM - 12 Dec 2016
Photo published for Krebs Gives Trump Campaign, DNC, RNC Failing Security Grade for DMARC
Krebs Gives Trump Campaign, DNC, RNC Failing Security Grade for DMARC
Krebs on Security today published an article describing how the Donald Trump campaign, the DNC, and the RNC all have failed to use email…
 4 4 Retweets   5 5 likes

Justin Fier, Director of Cyber Intelligence and Analysis at Darktrace
"With the right technology, organizations can keep a close eye on their data and spot unusual digital behavior as it unfolds."

Michael Sutton, CISO at Zscaler
 Michael Sutton @michaelawsutton
Yes @realDonaldTrump, attribution of hacking is hard…but when democracy is at risk, we have an obligation to leave no stone unturned.
2:27 PM - 12 Dec 2016
  6 6 Retweets   9 9 likes

Kevin Mitnick, Mitnick Security
 Kevin Mitnick ✔ @kevinmitnick
[email protected] Not true. You can catch hackers after the act as well. Take it from someone who knows this fact very well.
3:23 PM - 12 Dec 2016
  1,247 1,247 Retweets   2,226 2,226 likes

Daniel Clayton, Director of Customer Security Operations at Rackspace
"Hacks are like criminal cases. Clues are left, ID'd by a trained eye and packaged together with other evidence to create a bigger picture."

"Security investigators can pick up on subtle bread crumbs left by hackers, even their cover up. Piece together enough clues & eliminate doubt."

Source: Mashable

Topics: Social Engineering, Speaking Engagements, threat, Forensics, Global Ghost Team, Hacked, Incident Response, penetration testing, World's Most Famous Hacker, Computer, Exchange, Exploits, cybersecurity, Hacker, hacking, Invisibility Powers, red-teaming, security, Security Assessment, Security Awareness, Mitnick Security, Training, Vulnerability Assessments, white hat, Absolute Zero-day, Art of Invisibility, Cyber, Cyberthreat, Art of Deception, Art of Intrusion, Ghost in the Wires, Information, Kevin Mitnick, Keynote Speech

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

Red Team Testing vs. Penetration Testing

As the cost of cyber attacks continues to grow — in 2023, the worldwide cost of cyber attacks reached $8 trillion and, by 2025, the total cost is esti..

Read more ›

What Is Credential Harvesting and How Do Threat Actors Pull It Off?

Credential harvesting, otherwise known as credential compromising or credential theft, can be a highly devastating cyber threat. It also happens to be..

Read more ›

How Threat Actors Bypass 2FA and What Preventative Steps You Can Take

Two-factor authentication (2FA, or MFA) is a security layer designed to verify the identity of those logging in to accounts. By sending codes to the p..

Read more ›