January 12, 2015
“The Twitter account for U.S. Central Command was suspended today after it was hacked by ISIS sympathizers, a defense official told CNN.
A series of unusual tweets were published with apparent warnings from ISIS as well as links, images and Pentagon documents that reveal contact information for members of the military.
Central Command's YouTube page was also apparently hacked and contained videos of what looked like war propaganda by militant fighters.
The actions came on the same day that President Barack Obama spoke at the Federal Trade Commission about initiatives to protect the identities and privacy of U.S. citizens and to limit damages from cyberattacks.”
Get complete coverage of breaking news on CNN TV, CNN.com and CNN Mobile.
December 31, 2014
Many tend to think of biometrics as the ultimate passcode. The patterns of our irises and blood vessel in our eyes, or the whorls of our fingerprints, are held to be unhackable. And yet, our individual biological attributes must be reduced to algorithms to be useful to computers. Once reduced to a set of numbers, they are as hackable as any other complicated passcode.
Now a white hat hacker has shown he can use a photograph to reproduce the thumbprint of the German Defense Minister.
Biometrics are not a silver bullet, just another good layer of security. Comments
October 20, 2014
Such attacks can originate from many sources. The attackers are usually disgruntled employees, dissatisfied investors, unhappy customers, competitors and extortionists who are upset with a company and want to harm it.
The attacks can take many forms. Some of them are:
- Posting defamatory comments on gripe websites like Ripoff Report.
- Posting malicious and false comments on social media sites like Twitter, Facebook.
- Sending anonymous defamatory mails to customers and clients, to get them to change their perception of a company or a brand.
- Putting up false Yelp! reviews, changing Wikipedia entries to reflect false or defamatory content about company executives or brands, seeking to cause embarrassment.
- Creating blogs and websites and posting defamatory or disparaging content about someone’s reputation or brand on them.
In their book, “Digital Assassination: Protecting your Reputation, Brand or Business Against Online Attacks”, authors Mark Davis and Richard Torrenzano talk about Seven Swords that can be used to harm brands and reputations online. We will discuss one of them, which the authors call ‘evil clones’...
Continue reading on "Tips to Respond to Online Attacks on Your Brand and Reputation" on ahref.com
October 7, 2014
The ramifications of FBI Director James Comey’s recent “60 Minutes Interview” is sinking in … and sinking in deep. He said that all U.S. companies have been hacked by the Chinese – that the typical Chinese hacker is like a “drunk burglar” prowling for “trade secrets.”
At the very least, Director Comey’s remarks recommend a strategy of disinformation. Drunk burglars often have trouble distinguishing real diamonds from those made of glass. Comments
Click here to see our blog archive