TECHNOLOGY > Key Areas > Social Media


« Back to News

2020-02-17

Fake News And The 2020 Presidential Election

American voters report a high level of concern about how secure the 2020 presidential election will be and worry about the perils of disinformation.

2020-02-04

Facebook Crime In Britain Rises 19%

The total number of Facebook-related crimes reported by UK police forces was 32,451 in 2019- 2020, an increase of 19% over the previous year.

2020-01-27

Publishers Spread Fake News

Social media platforms amplify controversy and have a special responsibilty to contol & remove Fake News.

2019-11-25

Regulatory Plans For Artificial Intelligence & Algorithms

Two pieces of legislation are under consideration by the US Congress, one regulating the use of Algorithms and the other the development of AI.

2019-11-11

Tech Giants Have Facilitated An Online Slavery Market

An undercover BBC Arabic investigation has found that domestic workers are being illegally bought and sold online in a booming black market.

2019-11-08

Fake News Generated Against Hong Kong Protesters

Discovered: A coordinated network of activities by China that spread disinformation on social media about the mass protests in Hong Kong.

2019-10-31

Facebook, Free Speech & Fake News

Arbiters Of Truth: Twitter's decision to cease political advertising renews pressure on Facebook to control the flow of fake news across its platform.

2019-10-30

Facebook Sues Over Spyware Planted On WhatsApp

Facebook turns aggressive and has filed legal action in California against Israeli NSO Group for allegedly hacking WhatsApp.

2019-10-14

Iranian Hackers Deploy New Spear-Phishing Techniques

The Iranian state-sponsored threat actor known as Charming Kitten is using new spear-phishing methods, according to the experts at ClearSky.

2019-10-11

Google Creates Video Tools To Fight Deepfakes

Google has released a database of 3,000 deepfakes to help researchers build the tools needed to take down harmful fake videos.

2019-10-11

Police Location App Used By Hong Kong Protesters Deleted

Apple has removed an app that protesters in Hong Kong have used to track police movements and tear gas use, saying the app 'violated its rules'.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Berkman Klein Center for Internet & Society

Berkman Klein Center for Internet & Society

The Berkman Klein Center for Internet & Society is a research center at Harvard University that focuses on the study of cyberspace.

Information Security Media Group (ISMG)

Information Security Media Group (ISMG)

Information Security Media Group is the world’s largest media organization devoted solely to information security and risk management.

Tresorit

Tresorit

Tresorit helps teams to collaborate securely and easily by protecting their data with end-to-end encryption.

Sogeti

Sogeti

Sogeti deliver solutions that enable digital transformation and offer cutting-edge expertise in Cloud, Cybersecurity, Digital Manufacturing, Quality Assurance, Testing, and emerging technologies.

BMS Group

BMS Group

BMS is an independent, employee-owned specialist insurance broking group. Broking solutions include Cyber and Technology.

ATIS Systems

ATIS Systems

ATIS Systems offers first-class complete solutions for legal interception, mediation, data retention, and IT forensics.

Approachable Certification

Approachable Certification

Approachable Certification is a UKAS accredited certification body offering down-to-earth and competitively priced audits against ISO Management Systems standards.

Crosser

Crosser

The Crosser Platform enables real-time processing of streaming or batch data for Industrial IoT, Data Transformation, Analytics, Automation and Integration.

Tier1Asset (T1A)

Tier1Asset (T1A)

T1A is Europe’s leading IT refurbisher. We offer certified data erasure using blancco on site and at our facilities, providing environmentally sound disposal of your used equipment.

C5 Capital

C5 Capital

C5 Capital is a specialist investment firm that exclusively invests in the secure data ecosystem including cybersecurity, cloud infrastructure, data analytics and space.

BastionZero

BastionZero

BastionZero is leveraging cryptography to reimagine the tools used to manage remote access to servers, containers, clusters, applications and databases across cloud and on-prem environments.

Riskonnect

Riskonnect

Riskonnect technology empowers organizations with the ability to anticipate, manage, and respond in real-time to strategic, operational, and digital risks across the extended enterprise.

Sri Lanka CERT

Sri Lanka CERT

Sri Lanka CERT is the National Centre for Cyber Security, which has the national responsibility of protecting the nation’s cyberspace from cyber threats.

SignalRed

SignalRed

SignalRed provides the cutting edge next-generation penetration testing and secure development solutions to startups and large enterprises.

Velotix

Velotix

Velotix empowers organizations to maximize the value of their data while ensuring security and compliance in a rapidly evolving regulatory landscape.

Thero6

Thero6

Thero6 develop dynamic financial analysis algorithms that help prevent coin collapses and theft of cryptocurrency funds by identifying the transaction absolutely throughout the chain.