Digital Assassination

Protecting your reputation, brand or business against online attacks

“In the future, which is now, everyone will have 15 minutes of shame.”

Two leading reputation experts reveal how online attacks destroy brands, reputations, even lives...and provide a course of actions to turn the tables on digital assassins.

Breaking News: ISIS Hacks CENTCOM Twitter Account

January 12, 2015

“The Twitter account for U.S. Central Command was suspended today after it was hacked by ISIS sympathizers, a defense official told CNN.

A series of unusual tweets were published with apparent warnings from ISIS as well as links, images and Pentagon documents that reveal contact information for members of the military. 

Central Command's YouTube page was also apparently hacked and contained videos of what looked like war propaganda by militant fighters.

The actions came on the same day that President Barack Obama spoke at the Federal Trade Commission about initiatives to protect the identities and privacy of U.S. citizens and to limit damages from cyberattacks.”

Get complete coverage of breaking news on CNN TV, and CNN Mobile.



Photo Fingerprint Hack

December 31, 2014

Many tend to think of biometrics as the ultimate passcode. The patterns of our irises and blood vessel in our eyes, or the whorls of our fingerprints, are held to be unhackable. And yet, our individual biological attributes must be reduced to algorithms to be useful to computers. Once reduced to a set of numbers, they are as hackable as any other complicated passcode.

Now a white hat hacker has shown he can use a photograph to reproduce the thumbprint of the German Defense Minister.

Biometrics are not a silver bullet, just another good layer of security.


Tips to Respond to Online Attacks on Your Brand and Reputation

October 20, 2014

Such attacks can originate from many sources. The attackers are usually disgruntled employees, dissatisfied investors, unhappy customers, competitors and extortionists who are upset with a company and want to harm it.

The attacks can take many forms. Some of them are:

  • Posting defamatory comments on gripe websites like Ripoff Report.
  • Posting malicious and false comments on social media sites like Twitter, Facebook.
  • Sending anonymous defamatory mails to customers and clients, to get them to change their perception of a company or a brand.
  • Putting up false Yelp! reviews, changing Wikipedia entries to reflect false or defamatory content about company executives or brands, seeking to cause embarrassment.
  • Creating blogs and websites and posting defamatory or disparaging content about someone’s reputation or brand on them.

In their book, “Digital Assassination: Protecting your Reputation, Brand or Business Against Online Attacks”, authors Mark Davis and Richard Torrenzano talk about Seven Swords that can be used to harm brands and reputations online. We will discuss one of them, which the authors call ‘evil clones’...

Continue reading on "Tips to Respond to Online Attacks on Your Brand and Reputation" on




China Is Sitting Next to You Right Now

October 7, 2014

James Comey, FBI, 60 MinutesThe ramifications of FBI Director James Comey’s recent “60 Minutes Interview” is sinking in … and sinking in deep. He said that all U.S. companies have been hacked by the Chinese – that the typical Chinese hacker is like a “drunk burglar” prowling for “trade secrets.”

At the very least, Director Comey’s remarks recommend a strategy of disinformation.  Drunk burglars often have trouble distinguishing real diamonds from those made of glass.


Click here to see our blog archive