TECHNOLOGY > Key Areas > Social Media


« Back to News

2020-05-11

COVID-19 Tracing App Problems

There is a growing divergence in the technical concepts used to develop an effective mobile tool to trace COVID-19 infected mobile users.

2020-05-05

Hackers Are Selling Your Social Media Data

An investigation shows that Social Media companies are failing to clamp down on scammers selling people's personal details.

2020-05-06

UK Virus Tracking App Goes On Trial

Millions of people in the UK will soon be asked to track their movements via smartphone to limit the spread of coronavirus, despite privacy concerns.

2020-05-04

Zoom 5.0 Aims To Reduce 'Zoom Bombing'

Zoom is a prime target for hackers and spies but security researchers are saying that even the new 5.0 app with encryption is a privacy threat.

2020-04-25

Millions of Facebook Profiles For Sale

The Dark Web has 267 million Facebook profiles with email, full name, last name, phone, Facebook ID, last connection, status & age for sale.

2020-04-23

Google Reports 18m Coronavirus Scam Emails Every Day

Hackers are sending roughly 18 million hoax emails every day and the COVID-19 virus may now be the biggest phishing topic ever.

2020-04-09

No, 5G Does Not Spread Coronavirus

Conspiracy theories over a link between the roll out of 5G and the spread of coronavirus have been spreading through social media networks.

2020-03-31

Teens Abandon TV and Take News On-Line

British media is splitting along generational and ethnic lines and the time spent by young people watching live news has dropped by almost a third.

2020-03-11

Cyber Crime Methods Are Evolving

Criminals are quickly developing new tools and techniques to take advantage of changes in the ways consumer and businesses behave.

2020-02-28

Facebook Scams Offer Fake Money To Steal Personal Data

Facebook is a prime vehicle for hackers to target unsuspecting users with various online scams to get you to disclose confidential information.

2020-02-17

Fake News And The 2020 Presidential Election

American voters report a high level of concern about how secure the 2020 presidential election will be and worry about the perils of disinformation.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

Watch this webinar and get a comprehensive roadmap for securely adopting generative AI using Amazon Bedrock, a fully managed service that offers a choice of high-performing foundation models (FMs).

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Qualitest Group

Qualitest Group

Qualitest is the world’s largest pure play Quality Assurance and software testing company.

Texplained

Texplained

Texplained specializes in security audits of microchips to identify vulnerabilities and protect against invasive cyber attacks.

Ridgeback Network Defense

Ridgeback Network Defense

Ridgeback is an enterprise security software platform that defeats malicious network invasion in real time. Ridgeback champions the idea that to defeat an enemy you must engage them.

Skurio

Skurio

Skurio create cost-effective, intuitive and powerful Cloud based solutions to identify threats, detect data breaches outside the network and automate the response.

StackRox

StackRox

StackRox delivers a container-native security platform that adapts detection and response to new threats.

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

GCSCC's work is focused on developing a framework for understanding what works, what doesn’t work and why – across all areas of cybersecurity capacity.

ProWriters

ProWriters

As a leading cyber insurance company, ProWriters offers flexible Cyber Liability Insurance coverage designed to cover privacy, data, and network exposures.

Cyber Smart Defense

Cyber Smart Defense

Cyber Smart Defense is a specialist provider of penetration testing services and IT security audits.

US Army Cyber Command (ARCYBER)

US Army Cyber Command (ARCYBER)

US Army’s Cyber Command (ARCYBER) is engaged in the real-world cyberspace fight today, against near-peer adversaries, ISIS, and other global cyber threats.

FortKnoxster

FortKnoxster

FortKnoxster is a cybersecurity company within the Crypto & FinTech space. Our encryption technologies are blockchain integrated.

CloudCover

CloudCover

CloudCover is a software-defined cybersecurity risk solution that provides risk awareness, risk analytics, and data security in real time.

Dazz

Dazz

Dazz is the cloud security remediation platform for smart security and development teams.

Censinet

Censinet

Censinet provides the first and only third-party risk management platform for healthcare organizations to manage the threats to patient care that exist within an expanding ecosystem.

TOTM Technologies

TOTM Technologies

TOTM Technologies provides end-to-end identity management and biometrics products, powering Digital identity and Digital onboarding solutions.

Avalor

Avalor

Avalor are on a mission to help security teams make faster, more accurate decisions by making sense of their data. With Avalor you can bring in data from anywhere, normalize it and analyze it.

Leostream

Leostream

Leostream's Remote Desktop Access Platform enables seamless work-from-anywhere flexibility while maintaining security and constant visibility of users.