Category Archives: Blog

Social Media Could Ruin Business

How Social Media Can Ruin Your Reputation

How Social Media Can Ruin Your Reputation

Whether it comes from hackers, disgruntled customers, or is simply a backlash against something you post, negative social media content can destroy trust in your brand in a matter of minutes.

“Social media is the most immediate threat to your company’s reputation,” says Pete Knott, digital consultant at reputation management consultancy Lansons.

“If not taken seriously it can and will directly impact your company financially and culturally.”

Fake news remains one of the biggest challenges – despite machine learning crackdowns by networks such as Facebook and Twitter.

In May, for example, shares in the UK’s Metro Bank plunged 11% before it could shake off inaccurate social media rumors that it was facing financial difficulties.

And according to Ilia Kolochenko of Geneva-based internet security company Immuniweb, the consequences could potentially be much worse. Here are some ways how social media can ruin your reputation



Using Open Source Intelligence (OSINT) to show how IAF’s Abhinandan shot down a Pakistani F-16 1

Using Open Source Intelligence (OSINT) to show how IAF’s Abhinandan shot down a Pakistani F-16

Article by: SAMEER JOSHI for  The Print

New Delhi: After the Indian Air Force strike on a Jaish-e-Mohammed terrorist camp in Pakistan on 26 February, followed by the high voltage aerial skirmish the next day between the rival air forces, the widespread din — created from manufactured lies, deceit and a misinformation campaign by the Pakistan Army’s infamous Inter-Services Public Relations (ISPR) — to deny and cover-up tactical shortcomings of the Pakistan Air Force and the shooting down of the PAF aircraft — has pro-actively blurred the truth.

The first casualty of war is always the truth! Somewhere in between this subterfuge is a PAF pilot and an aircraft tail number — shot down in heady combat by an IAF MiG-21, before the MiG itself fell victim to an air-to-air missile fired by the PAF.


3 Ways Criminals Can Get Your Data

Social Engineering: 3 Ways Criminals Can Get Your Data

Social Engineering: 3 Ways Criminals Can Get Your Data

When we hear social engineering, we immediately think phishing. Those of us in the industry may also think about vishing, dumpster diving, or the SECTF held at DEFCON and DerbyCon. Whether you are technically inclined or not, you are probably familiar with the “Nigerian Prince” or “419” schemes. You have probably received a convincing or near-convincing phishing email claiming to be “Delta” or “Apple” or “Amazon.” This article aims to educate you about other social engineering attack vectors.


Influencer Accounts Being Stolen

Hackers are Stealing Top Instagram Accounts

By: Taylor Lorenz, The Atlantic

In early October, a publicist received an irresistible message via email. The publicist’s client is a top “influencer”—someone who leverages a social-media following to exert influence and, usually, make money, often by selling sponsored posts. “We would be extremely interested in a business partnership,” a man calling himself “Joshua Brooks,” wrote. His pitch was eye-popping: He was offering “80 Thousand US Dollars” for a single picture. Yes, Influencer Accounts Being Stolen by Hackers.


Stealing Social Media

A look at how it can happen.

Some employees have direct access to the corporate social media platforms, giving them the power to rename social media channels or post whatever they like. Say a former employee moves to competitive business, changes the name of the original social media channel, and immediately starts contacting the fans and followers on behalf of the new company. This happens all the time. It’s called Stealing Social Media.

The need for good contracts and agreements between employers and employees when it comes to social media is paramount. In addition, systems need to be in place to prevent this from happening.

This includes securing all passwords and changing them immediately prior to terminating an employee with passwords, as well as a strict copyright and ownership clause in the contract.

How to remove digital footprint from internet - digital footprint

How to Remove Your Digital Footprint

Digital Footprints and OSINT

When we talk about the work of gathering intelligence and erasing digital footprints, most people conjure the image of a James Bond-esque spy, infiltrating an enemy organization under an assumed identity. But there’s another kind of intelligence gathering, just as important to commercial, military, diplomatic and political operations: open-source intelligence, or OSINT for short. OSINT is gathered from publicly available information sources like the news, government documents, and social media reports, among others. But in order to be effective, OSINT analysts have to be just as careful about concealing their online identities as clandestine operatives.

Online surveillance is just as prevalent and often more subtle than real-world surveillance. If the OSINT analyst doesn’t cover their tracks, it’s fairly easy for someone with the resources of a nation’s intelligence agency, or even a large corporation, to track down the identity of that analyst as they dig for information. The analyst must wipe away their digital footprints, so to speak.


Navigating Social Media After a Catastrophe 2

Navigating Social Media After a Catastrophe

After the attacks on London bridge, Londoners rallied on Twitter using the hashtag #SofaForLondon, offering their sofas, and spare rooms to residents without homes.

During Hurricane Harvey, hashtags like #sosHarvey were used to call for civilian helpers when phone lines were down.

The world turned to social media to grieve, lend a hand and show support.

As a business owner, how should you post following a calamity? A genuine express for sympathy for those affected by the tragedy is one thing, but you do not want to be viewed as yet another company joining in just to improve one’s corporate image.


Even the royals need social media intelligence 3

Even the royals need social media intelligence

Duchess of Sussex Meghan Markle has been taking heat through social media since her relationship with Prince Harry went public in 2016. Things were so bad that the prince ended up issuing an official statement condemning the “wave of abuse and harassment” she experienced.

Markle apparently isn’t the only member of the Royal Family who gets hounded by trolls online, either. Duchess of Cambridge Kate Middleton is also a target for trolls.

The strange thing is neither of them even use a personal social media account. Instead, they share updates through official royal platforms that have millions of followers.


The Fight that is Waging in Social Media 4

The Fight that is Waging in Social Media

The importance of social media intelligence doesn’t lie in the business world only, the government deployed a new division in the fight that is waging in Social Media.

“We need to develop our asymmetric edge and bring focus to the orchestration of intelligence, information operations, cyber, electronic warfare and unconventional warfare,” Lieutenant General Ivan Jones, the commander of Britain’s field army, said as he announced the formation of a cyber warfare unit to fight “above and below the threshold of conventional conflict.”


1 2 3 4