Digital Assassination

Protecting your reputation, brand or business against online attacks

“In the future, which is now, everyone will have 15 minutes of shame.”

Two leading reputation experts reveal how online attacks destroy brands, reputations, even lives...and provide a course of actions to turn the tables on digital assassins.

Positive Computing: The tech buzzword you need to know for 2015

February 3, 2015

Dominic Basulto - Washington Post

We usually think about technology making us smarter, more productive or more social – but not always more compassionate, wiser or happier. The “positive computing” movement, championed by Rafael Calvo andDorian Peters of the University of Sydney, hopes to change all that. Supporters of positive computing make the case that technology should contribute to well-being and human potential. And that’s a message that’s starting to attract interest in places such as MITStanford and Google.

If positive computing takes off, it will be because the design of new technology has somehow lost its way. Technology now makes us distracted, busy and unhappy. People are turning away from social networks and finding ways to tune out the noise around them. Technology is making us stressed rather than mindful. All of that goes against what Calvo and Peters described in the July-August 2012 issue of Interactions magazine as what should be the higher calling of technology: “to support well-being, wisdom and human potential.” And this is a theme that is now the basis for their new book, Positive Computing: Technology for Well-being and Human Potential, published by MIT Press at the end of 2014...

...In many ways, positive computing is a natural outgrowth of positive psychology, which focuses on what makes people well rather than what makes people ill. This focus on the “positive” is perhaps best exemplified by Harvard psychologists telling us how to make our kids “kind” and“happiness” showing up in the titles of TED Talks. Now it’s designers, not just psychologists, who are talking about happiness. Combine ubiquitous computing with new thinking about psychology, and you have the basis for something potentially fundamentally new: a movement that focuses on ways that technology can make lives more fulfilling.

Continue reading: Positive computing: The tech buzzword you need to know for 2015
Dominic Basulto is a futurist and blogger based in New York City.


Breaking News: ISIS Hacks CENTCOM Twitter Account

January 12, 2015

“The Twitter account for U.S. Central Command was suspended today after it was hacked by ISIS sympathizers, a defense official told CNN.

A series of unusual tweets were published with apparent warnings from ISIS as well as links, images and Pentagon documents that reveal contact information for members of the military. 

Central Command's YouTube page was also apparently hacked and contained videos of what looked like war propaganda by militant fighters.

The actions came on the same day that President Barack Obama spoke at the Federal Trade Commission about initiatives to protect the identities and privacy of U.S. citizens and to limit damages from cyberattacks.”

Get complete coverage of breaking news on CNN TV, and CNN Mobile.



Photo Fingerprint Hack

December 31, 2014

Many tend to think of biometrics as the ultimate passcode. The patterns of our irises and blood vessel in our eyes, or the whorls of our fingerprints, are held to be unhackable. And yet, our individual biological attributes must be reduced to algorithms to be useful to computers. Once reduced to a set of numbers, they are as hackable as any other complicated passcode.

Now a white hat hacker has shown he can use a photograph to reproduce the thumbprint of the German Defense Minister.

Biometrics are not a silver bullet, just another good layer of security.


Tips to Respond to Online Attacks on Your Brand and Reputation

October 20, 2014

Such attacks can originate from many sources. The attackers are usually disgruntled employees, dissatisfied investors, unhappy customers, competitors and extortionists who are upset with a company and want to harm it.

The attacks can take many forms. Some of them are:

  • Posting defamatory comments on gripe websites like Ripoff Report.
  • Posting malicious and false comments on social media sites like Twitter, Facebook.
  • Sending anonymous defamatory mails to customers and clients, to get them to change their perception of a company or a brand.
  • Putting up false Yelp! reviews, changing Wikipedia entries to reflect false or defamatory content about company executives or brands, seeking to cause embarrassment.
  • Creating blogs and websites and posting defamatory or disparaging content about someone’s reputation or brand on them.

In their book, “Digital Assassination: Protecting your Reputation, Brand or Business Against Online Attacks”, authors Mark Davis and Richard Torrenzano talk about Seven Swords that can be used to harm brands and reputations online. We will discuss one of them, which the authors call ‘evil clones’...

Continue reading on "Tips to Respond to Online Attacks on Your Brand and Reputation" on




Click here to see our blog archive