TECHNOLOGY > Key Areas > Social Media


« Back to News

2019-10-04

Governments Urge Facebook To Create Backdoor Access To Encrypted Messages

The USA, United Kingdom and Australia are all asking Facebook to delay plans for end-to-end encryption across its messaging services.

2019-09-30

Organised Social Media Manipulation

The use of computational propaganda to shape public attitudes via social media has become main-stream, far beyond the actions of a few bad actors.

2019-09-18

Social Media Should Have Strict Privacy

Eighty percent of delegates attending Black Hat USA 2019 agree that more security and privacy laws are needed to protect social media users.

2019-08-28

Fact-Checking Comes To Instagram

Facebook has owned Instagram for seven years and is now expanding its existing independent 3rd party fact checker to Instagram.

2019-08-21

Pakistan Clashes With India In Cyberspace

Pakistan has unleashed a social media campaign to promote anti-India propaganda following a disagreement over the region of Kashmir.

2019-08-20

Foreign Cyber Intrusions On The USA

It’s not just happening on Election Day. Foreign governments are using social media to insert themselves into US politics “every single day'.

2019-08-09

FBI Turns To Social Media To Track Shooters

The US is growing used to the painful reality of the weaponisation of social media to cause harm. Now the FBI want to use it as an alerting tool.

2019-08-07

Fraudsters Target Social Media Influencers

Social media 'influencers' and other celebrities are being duped into endorsing bogus products, services and fake investment opportunities.

2019-07-29

Malware Delivery Via LinkedIn

A Phishing campaign using LinkedIn network invitations to deliver malicious documents included the use of three new malware families.

2019-07-23

Privacy: Can You Trust FaceApp With Your Face?

Smartphone software used to simulate the ravages of time upon users' features is at the centre of a global cybersecurity row over its Ts&Cs.

2019-06-24

Spies Use AI-Generated Faces To Connect With Targets

Fake Faces: A vast army of phantom profiles are lurking on LinkedIn, the popular website used for professional networking.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Halon

Halon

Halon is a flexible security and operations platform for in-transit email.

Pareteum

Pareteum

Pareteum is a leading Global provider of mobile networking software and services. Our mission is to provide a single solution to the problem of fully enabling and securing the Mobile Cloud.

CyBOK - University of Bristol

CyBOK - University of Bristol

CyBOK is a comprehensive Body of Knowledge to inform and underpin education and professional training for the cyber security sector.

36 Group

36 Group

36 Group's criminal law team, has the experience and specialist knowledge to conduct effectively trials heavily concerned with the growing phenomenon of Cybercrime.

Haven Group

Haven Group

Haven Group and its companies are a cyber security one-stop-shop for our clients offering a full range of cyber security services to our clients in a unified and united way.

PrivacySavvy

PrivacySavvy

PrivacySavvy's mission is to provide you with all the information that you need to ensure that your internet privacy is intact, your devices are secure, and that any time you step online, you’re safe.

Canopius Group

Canopius Group

Canopius is a global specialty lines insurance and reinsurance company and one of the top 10 insurers in the Lloyd’s insurance market.

blueAllianceIT

blueAllianceIT

blueAlliance IT is an investment and growth platform that unites local MSP and IT companies around the nation, helping them to grow and operate competitively.

Bugbank

Bugbank

Bugbank (aka Vulnerability Bank) is a leading SaaS platform for internet security services in China.

McDonald Hopkins

McDonald Hopkins

McDonald Hopkins is a business advisory and advocacy law firm. We focus on insightful legal solutions that help our clients strategically plan for an increasingly competitive future.

Sentra

Sentra

Sentra is focused on improving data security practices within the cloud, mitigating the risks of damaging data leaks by providing comprehensive visibility into critical data assets.

SubCom

SubCom

How Much Do You Trust Your Endpoint? With our ‘Habituation Neural Fabric’ based endpoint security platform, you can observe and manage the Trust Score of your endpoints in real-time.

Entro Security

Entro Security

Entro is the first holistic secrets security platform that detects, safeguards, and enriches with context your secrets across code, vaults, chats, and platforms.

HashiCorp

HashiCorp

At HashiCorp, we believe infrastructure enables innovation, and we are helping organizations to operate that infrastructure in the cloud.

Vultara

Vultara

Vultara provides web-based product security risk management tools for electronics manufacturers.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Longbow Security

Longbow Security

Longbow automates root cause for your application and cloud risks, enabling teams with intelligent remediation actions that reduce the most risk with the least effort.