TECHNOLOGY > Key Areas > Social Media


« Back to News

2019-01-21

Zimbabwe Orders Internet Disconnected

The government in Zimbabwe has responded to widespread protests over rising fuel prices by cutting off the nation's wireless & internet services.

2019-01-18

Vietnam Says Facebook Is Acting Illegally

Vietnam has accused Facebook of violating a new cybersecurity law by refusing to remove anti-government content from its site.

2019-01-21

Google Search Results Spoofed To Create Fake News

A spoofing technique that creates fake Google search results could be used in political influence campaigns or for other subversive purposes.

2019-01-05

Major US Newspapers Under Malware Attack

Several major newspaper titles suffered serious print and delivery disruption caused by targeted cyber-attacks originating outside the US.

2019-01-07

Prosecutors Sue Facebook Over Cambridge Analytica

Facebook faces a fine of up to $1.7 billion if all 340,000 instances are considered “violations” as Washington prosecutors press charges.

2018-12-31

Publishers Need Micro-Payments Now

Professional journalism is on a downward slope, driven by the growth of fake news, propaganda and personal blog opinion. What's to be done?

2018-12-24

Social Media Outpaces Print Newspapers In The US

Social media sites have surpassed print newspapers as a news source for Americans.

2018-12-19

US Senator Calls For New Cyber Doctrine

Sen. Mark Warner calls for a new US cyber doctrine designed to combat modern threats from hackers and disinformation campaigns.

2018-12-18

Three Ways Facebook Could Clean Up Its Act

Facebook, Twitter and other social media companies are causing society-wide damage. Here are three ideas to reduce the harm they do.

2018-12-14

Edward Snowden Calls For Google To Stay Out Of China

Edward Snowden adds his voice to human rights groups asking Google to back out of its plans to launch a censored search engine in China.

2018-12-07

Facebook CEO Zuckerberg Backed Sharing Customer Data

Zuckerberg questioned the business case for giving millions of outside software developers wide access to customer data, then endorsed it.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Altius IT

Altius IT

Altius IT reviews your website for security vulnerabilities and provides a report identifying vulnerabilities and recommendations to make secure.

Cyber Security Academy (CSA)

Cyber Security Academy (CSA)

The CSA aims to educate professionals who wish to contribute to strengthening the digital defensibility of states, organisations and individual citizens.

Touchstone Security

Touchstone Security

Touchstone Security is a company with a passion for technology, a hyper-focus on cybersecurity, and a special affinity for cloud technology.

Trusted CI

Trusted CI

Trusted CI, the NSF Cybersecurity Center of Excellence is comprised of cybersecurity experts who have spent decades working with science and engineering communities.

Athreon

Athreon

Athreon utilizes a fusion of AI technology, human interpretation, and the latest in cybersecurity to deliver sound business solutions that help our clients make better data-driven decisions.

Internet Crime Complaint Center (IC3)

Internet Crime Complaint Center (IC3)

The Internet Crime Complaint Center provide the public with a reporting mechanism to submit information to the FBI concerning suspected Internet-facilitated criminal activity.

Comparitech

Comparitech

Comparitech strives to promote cyber security and privacy for all. We are committed to providing detailed information to help our readers become more cyber secure and cyber aware.

Hubify

Hubify

Hubify is an experienced, service-driven technology company specialising in business connectivity across mobile, data, voice, cloud, & cyber security solutions.

SNC-Lavalin

SNC-Lavalin

SNC-Lavalin is a fully integrated professional services and project management company with offices around the world.

InfoSec Brigade

InfoSec Brigade

InfoSec Brigade offers a suite of specialized solutions that help businesses to mitigate risk by integrating cyber and IT security protocols with business goals.

BluSapphire

BluSapphire

BluSapphire is an industry-first, purpose-built, cloud-native, Hybrid XDR platform powered by AI and big data analytics.

Vigilant Ops

Vigilant Ops

Vigilant Ops is a leader in Software Bill of Materials (SBOM) Automation. A proactive approach to cybersecurity with continuous vulnerability monitoring.

E-CQURITY (ECQ)

E-CQURITY (ECQ)

ECQ is a network security company offering offensive security services and solutions focused on active offensive and defensive positioning.

Liquid C2

Liquid C2

Liquid C2 offers leading solutions to streamline workplace operations, secure cloud storage, rapid data recovery, and scale growth.

Secher Security

Secher Security

Secher Security is a professional and secure partner with a high level of professional expertise in simplifying and optimizing complex IT infrastructures.

Concentrix

Concentrix

Concentrix - the intelligent transformation partner. We help the world’s leading organisations to modernise technology, transform experiences, and solve their toughest business challenges.