• Sock puppet accounts are mainly known to those outside the information security field as accounts used for disinformation purposes, such as swaying your opinion about a topic or a product. However, this is not the only way to use a sock puppet account. In Hg’s D2K Summer FactSheet, up-and-coming cybersecurity researcher Dakota State University Junior, Mariel Klosterman, describes how sock puppets are used by malicious actors and OSINT investigators, types of sock puppet accounts, and how to create a sock puppet for information collection.
  • Great OSINT Finds - When We Love 'Em, We Must Share 'Em

    Hg's team of analysts pooled the newest, favorite, and remarkable open source research sites together and contributed to a new list of  go-to sources for public records, social media, geo location, and other great tools for OSINT and research alike.
  • Social Media and Employees

    When it comes to social media, are our work lives and our personal lives one and the same? Would we feel comfortable having our potential – or even current – employer perusing our social media posts? Hg's Manager of Investigations Rachel Kronenfeld and team highlight the legal possibilities and limitations of a social media review of an employee in this issue of Hg's Data2Know newsletter.
  • On Your Trademark, Get Set, Go!

    When it comes to trademark investigations, there’s one word that sticks out: use. Identifying first use, last use, and/or continuous use are the single most important factors in determining trademark rights. Hg's Senior Analyst Jake Pennington highlights the need-to-knows of Trademark use in this issue of Hg's Data2Know newsletter.

Title

Go to Top