Digital Assassination

Protecting your reputation, brand or business against online attacks


“In the future, which is now, everyone will have 15 minutes of shame.”

Two leading reputation experts reveal how online attacks destroy brands, reputations, even lives...and provide a course of actions to turn the tables on digital assassins.


Here's the Real Net Neutrality Issue

March 25, 2014

Corbis/imagebrokerWill Congress be able to thwart the plan of the Obama Administration to relinquish U.S. control over ICANN, which governs Internet root systems and addresses?  If not, who will be calling the shots?  Will authoritarian countries be able to block access not only internationally, but what we can see at home?

Read more in L. Gordon Corvitz's WSJ piece 'How to the Save the Internet'

 

 

 

 

Comments

Eye-C-U, Part 32

March 17, 2014

Peephole EyeBritish geek helped three women friends fix their computers.  Then he added a little something extra – he reversed their webcams so he could spy on them.  Wired reports:

Digital forensics expert Peter Sommer told Wired.co.uk that the techniques employed by Meldrum were "relatively unsophisticated" in that the victims knew him and had given him access to their computers.   

"Most of the time people would send a trojan to somebody and the software would covertly switch the  webcam on," he said. Anecdotally, he says, this sort of voyeurism is "very common" and spying software is "very easy to get hold of", but it's hard to tell the scale of the issue since people who are being viewed without their knowledge won't make a complaint to the police.

"But once there's a suspicion, any competent digital forensics investigator will be able to find the digital traces and trap [the perpetrator]."

Guilty on three counts.

Comments

Beware the Chameleon Virus!

February 26, 2014

Beware the “Chameleon virus.”  A new computer virus is now spreading like air-borne common colds, via WiFi. Like microbial evolution, viruses are gaining new advantages on an alarming scale.

The weaker security of public WiFi areas, like airports and coffee houses, are the targets of the Chameleon, according to a study at the University of Liverpool.

Comments

Now China is Hacking Our Limos

December 8, 2013

LimoThe CEO of the cybersecurity company Mandiant reports receiving spearphishing attacks in the form of PDF invoices from his limo provider.  What is truly scary about this is that the Chinese hackers are not yet inside Mandiant’s systems – otherwise, why would they bother?  Given that the company’s relationship with a limo provider is not something posted on public sites either, it raises the question of how the Chinese hackers knew which limo service the CEO uses.  Are the cyberattackers in China being helped by agents on the ground?

Comments

Click here to see our blog archive