Cyber Security of Weaponized Media in a Socially Engineered World

Corprorate Cyber Security., Cyber Security, Cyber Warfare, Cybersecurity, cyberwar, Digital Defense, Gov 2.0, IoT Security, Online Reputation Control, Reputation Security, Social Engineering, Social Media Cyber Security, US National Cyber Defense, Weaponized Media
I.     Introduction The world is seeing an ongoing multi-faceted cyber attack(s) (social engineering) that uses weaponized fake media, digital false flags and other digitally obfuscated materials. These attacks stem from nation states, paid hacker cartels and mercenary hackers globally. These cyber security attacks utilize social engineering, weaponized media and fake media. We have been studying these socially engineered attacks since 2009, and have created unique responses to them. II.    Main body The Green Revolution of 2009 in Iran marked the first known use of weaponized social media. The Government of Iran utilized Twitter to get western citizens to spread their propaganda. Fast forward to 2016, where USA itself was attacked through long term, dedicated weaponized media cyber assault on our democracy; and government alike by Russia and its agents. This…
Read More
Modern Information Warfare Hits Hard

Modern Information Warfare Hits Hard

Cyber Reputation Control, Cyber Security, Cyber Warfare, Cybersecurity, cyberwar, Digital Defense, Online Reputation Security, Reputation Control, Reputation Control and Management, Reputation Security, Social Engineering, Social Media Cyber Security, US National Cyber Defense
2016 was just the latest in #cyberwar; and #informationwarfare attacks where even bills were introduced in Congress. It has been ongoing as long as there have been digital mediums and technologies; and information distribution technology. My company saw it happening last year and got more and more concerned as the election grew closer. We literally wrote letters to people in government, people at the DNC and elsewhere, basically yelling as loudly as we could that the #USA was being cyber and information warfare attacked.   As a cyber security, and weaponized information expert - it was all too clear what was happening. It has left a feeling of being sick in the stomach for a year now, and this feeling has not abated. Because it has not ended. For millions of Americans and millions of…
Read More
Digijaks CEO Speech at US Army CyberTalks NYC

Digijaks CEO Speech at US Army CyberTalks NYC

Corprorate Cyber Security., Cyber Reputation Control, Cyber Security, Cyber Warfare, Cybersecurity, cyberwar, Digital Defense, Digital Diplomacy, Gov 2.0, IoT Security, Online Reputation Control, Reputation Control, Reputation Control and Management, Reputation Security, Social Engineering, Social Media Cyber Security, US National Cyber Defense
https://www.youtube.com/watch?v=eX5Rgp2QmoU&feature=youtu.be  
Read More
#CyberSecurity #DigitalDiplomacy 2017

#CyberSecurity #DigitalDiplomacy 2017

Cyber Reputation Control, Cyber Reputation Management, Cyber Warfare, Cybersecurity, cyberwar, Digital Diplomacy, Gov 2.0, Online Reputation Control, Reputation Control, Reputation Control and Management, Reputation Security, Social Engineering, Social Media Cyber Security
#Digitaldiplomacy and #Cybersecurity on a Rough Patch in 2017. The last several years have seen an explosion of digital diplomacy tools and techniques. This is driven by an ongoing growth in technology platforms; and social media combined with the increased numbers of world Governments adopting open data and open government principles. There has also been a parallel explosion in fake social media, fake news and fake information being propagated globally. The effect of the combined forces is that cybersecurity is now playing an even more vital role in digital diplomacy. Where digital diplomacy just a few years back was between recognized principals of Governments, now there are lots of other players trying to make that communication much more failure prone. Additionally we now have leaders using Twitter and other tools…
Read More

Global Cyber Security On Earth + in Space

Corprorate Cyber Security., Cyber Warfare, Cybersecurity, cyberwar, Digital Defense, Digital Shield, IoT Security, Online Reputation Security, Personal Cyber security, Platform/Service, Reputation Control, Reputation Security, Social Engineering, Social Media Cyber Security, US National Cyber Defense, Venture Capital Cyber Security
**Excerpt from a talk by Digijaks CEO Alan W. Silberberg at the 2016 GEOINT Symposium.** When you think of Cyber Security you probably think about your iphone getting hacked, or your email, or your companies servers, or your credit card, or bank card or health care, or banking, or government information plus so many others... But did you ever stop to think about how a huge chunk of all the data populating all those things actually gets there? Not in the sense of how Google asks prospective employees to describe how the internet works. But close. Think Space. Satellites are massive growth industry, for both government and business alike. We have scaled globally from a situation 20 years ago where only a handful of countries could afford to mount in…
Read More
Global Cybersecurity + Venture Capital

Global Cybersecurity + Venture Capital

Corprorate Cyber Security., Cyber Reputation Control, Cyber Security Venture Capital, Cyber Warfare, Cybersecurity, cyberwar, Digital Diplomacy, Online Reputation Security, Reputation Control, Reputation Control and Management, Reputation Security, Social Engineering, Social Media Cyber Security, Venture Capital, Venture Capital Cyber Security
We live in a hyper-connected world that brings the globe to you; and you and your family to the globe at equally fast speeds. While on one hand, any one of us can access the internet, through any number of tools, platforms, technology and software and almost any combination too. But on the other hand the internet can and does access us, and all of our information, every minute of every day. Probably more than you and your family access the internet. One thing that is growing in need and in reality is the international and cross cultural aspects of Cybersecurity. For example, businesses and governments alike in the US and in Israel face similar challenges within similar robust telecom and economic environments. 15 years ago the idea of US…
Read More

#cybersecurity The Gift everyone needs for the Holidays!

Cyber Reputation Control, Cyber Reputation Management, Cyber Security Venture Capital, Cybersecurity, cyberwar, Digijaks Reputation Control, Online Reputation Management, Online Reputation Security, Personal Cyber security, Reputation Control, Reputation Security, Social Engineering, Social Media Cyber Security, Venture Capital Cyber Security
Happy Holidays. It is, as is so commonly mentioned in the media: "That Time of Year Again." Yup. Packages. Shiny New Things. Cool Toys for the Kids and kid-adults alike. It is also the time of year of increased cyber crime attempts aimed at retailers. Add also the time of year when more families and organizations introduce new varieties of malware, ad-malware, viruses, worms, bad bots and devices that phone "home" into our homes, workplaces and civic spaces. https://twitter.com/IdeaGov/status/668911020937580544?ref_src=twsrc%5Etfw How? Because many devices are coming pre-loaded with malware. How many parents look into the workings of a cheap tablet before handing it off to the kids? How many people are checking new apps to see the permissions being requested on those new devices and old ones too? How many companies are…
Read More

Cybersecurity: Now the Crossover from Cyber to Real Life

Corprorate Cyber Security., Cyber Reputation Control, Cyber Reputation Management, Cyber Warfare, Cybersecurity, cyberwar, Developed by Digijaks, Digital Defense, Digital Shield, Gov 2.0, Online Reputation Control, Online Reputation Security, Personal Cyber security, Reputation Control, Reputation Control and Management, Reputation Management, Reputation Security, Social Engineering
[caption id="attachment_2095" align="aligncenter" width="300"] Cyber Security, Social Media, You.[/caption] Cybersecurity used to be be the geek's eagle's nest. it was hard to understand, hard to get to, hard to see the impact and need often times. If there was a CIO or CISO, he/she would not be in the board room too often, and usually the budgets were the first to go in any budget change environment. But the cycle switched. Now we are in the opposite cycle. The CIO and CISO are ruling the roost and commanding serious budgets and attention. But being missed in all the excitement is this: The Crossover from pure cyber crime to real world crime from the same instance. It is safe to say, times have changed. Now - Cybersecurity has become a word…
Read More

Reputation Control. Cybersecurity. Recent OPM Hacks and You.

Corprorate Cyber Security., Cyber Reputation Control, Cyber Reputation Management, Cyber Warfare, Cybersecurity, cyberwar, Digijaks Reputation Control, Digital Defense, Gov 2.0, Gov 3.0, Online Reputation Control, Online Reputation Management, Online Reputation Security, Reputation Control, Reputation Control and Management, Reputation Management, Reputation Management for Families, Reputation Security, Social Media Cyber Security, US National Cyber Defense
Reputation. Is hard to get, hard to maintain, hard to control; especially in an era of hacking by governments and criminals alke. Cybersecurity is something many people long put off as a back burner decision, or lower funded priority, but in actuality is a critical need, now at the forefront of many leaders' thinking due to the sheer number and audacity of the hacks from 2013 forward. There is a distinct triangulation between reputation control and cyber security and search results. The more things get hacked, the more information flows onto websites, both for sale, and for free, and the more the search engines index these results. Digijaks’ CEO Alan W Silberberg has written about this triangulation before as it relates to cyber security and how we all need to…
Read More