TECHNOLOGY > Key Areas > Social Media


« Back to News

2019-10-04

Governments Urge Facebook To Create Backdoor Access To Encrypted Messages

The USA, United Kingdom and Australia are all asking Facebook to delay plans for end-to-end encryption across its messaging services.

2019-09-30

Organised Social Media Manipulation

The use of computational propaganda to shape public attitudes via social media has become main-stream, far beyond the actions of a few bad actors.

2019-09-18

Social Media Should Have Strict Privacy

Eighty percent of delegates attending Black Hat USA 2019 agree that more security and privacy laws are needed to protect social media users.

2019-08-28

Fact-Checking Comes To Instagram

Facebook has owned Instagram for seven years and is now expanding its existing independent 3rd party fact checker to Instagram.

2019-08-21

Pakistan Clashes With India In Cyberspace

Pakistan has unleashed a social media campaign to promote anti-India propaganda following a disagreement over the region of Kashmir.

2019-08-20

Foreign Cyber Intrusions On The USA

It’s not just happening on Election Day. Foreign governments are using social media to insert themselves into US politics “every single day'.

2019-08-09

FBI Turns To Social Media To Track Shooters

The US is growing used to the painful reality of the weaponisation of social media to cause harm. Now the FBI want to use it as an alerting tool.

2019-08-07

Fraudsters Target Social Media Influencers

Social media 'influencers' and other celebrities are being duped into endorsing bogus products, services and fake investment opportunities.

2019-07-29

Malware Delivery Via LinkedIn

A Phishing campaign using LinkedIn network invitations to deliver malicious documents included the use of three new malware families.

2019-07-23

Privacy: Can You Trust FaceApp With Your Face?

Smartphone software used to simulate the ravages of time upon users' features is at the centre of a global cybersecurity row over its Ts&Cs.

2019-06-24

Spies Use AI-Generated Faces To Connect With Targets

Fake Faces: A vast army of phantom profiles are lurking on LinkedIn, the popular website used for professional networking.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Digitus Biometrics

Digitus Biometrics

Digitus Biometrics is a market leader in biometric access control. We can secure access to any entry point, from the front door to the server rack cabinet.

Cysec Resource Co (CRC)

Cysec Resource Co (CRC)

We offer expertise in information and cyber security, sourcing individuals and teams who provide information security expertise to the public and private sector.

Systancia

Systancia

Systancia offer solutions for the virtualization of applications and VDI, external access security, Privileged Access Management (PAM), Single Sign-On (SSO) and Identity and Access Management (IAM).

BSA - The Software Alliance

BSA - The Software Alliance

BSA is the leading advocate for the global software industry before governments and in the international marketplace.

UZCERT

UZCERT

UZCERT is the national Computer Emergency Response Team for Uzbekistan.

Ikarus Security Software

Ikarus Security Software

Ikarus focuses on antivirus and content-security solutions.

MadSec Security

MadSec Security

MadSec Security is a leading consulting company whose expertise are information and cyber security.

OneSpan

OneSpan

OneSpan (formerly Vasco Data Security) is a global leader in digital identity security, transaction security and business productivity.

ISEC7 Group

ISEC7 Group

ISEC7 Group is a global provider of mobile business services and software solutions. The company was one of the first movers in mobilising company and business processes.

Renesas Electronics

Renesas Electronics

Renesas Electronics delivers trusted embedded design innovation with solutions that enable billions of connected, intelligent devices to enhance the way people work and live - securely and safely.

Solidified

Solidified

Solidified is the largest audit platform for smart contracts. Our community has the highest concentration of top Blockchain security specialists and best-in-class code auditors.

Iowa Cyber Hub

Iowa Cyber Hub

Iowa Cyber Hub is a cybersecurity education partnership between Iowa State University and Des Moines Area Community College.

Hawk Network Defense

Hawk Network Defense

HAWK.io is the First Fully Automated, Multi-Tenant, Cloud-Based, MDR Service Company.

National Cryptologic Foundation (NCF)

National Cryptologic Foundation (NCF)

The National Cryptologic Foundation strives to influence the cryptologic future by sharing our educational resources, stimulating new knowledge, and commemorating our heritage.

Association of Azerbaijani Cyber Security Organizations (AKTA)

Association of Azerbaijani Cyber Security Organizations (AKTA)

The Association of Azerbaijani Cyber Security Organizations (AKTA) is a non-commercial organization aimed at strengthening the country's cybersecurity system.

ITRM

ITRM

ITRM are one of the UK’s top managed service providers and offer a range of award-winning IT solutions, from ad-hoc consultancy to cyber security.