TECHNOLOGY > Key Areas > Social Media


« Back to News

2018-12-11

Iran Using Websites To Spread Fake News

More than 70 websites found that push Iranian propaganda to 15 countries as part of a political influence operation.

2018-12-06

Fake Facebook Pages Account For 60% Of Social Network Phishing

Kaspersky's anti-phishing tools prevented 3.7m attempts to visit fraudulent social network pages in Q1. The majority were fake Facebook pages.

2018-11-29

Facebook's Sheryl Sandberg Is 'Tainted' By Crises

As the problems swirling around Facebook gain force, some insiders think that COO Sheryl Sandberg may end being handed the blame.

2018-11-29

Google Challenged Over Location Tracking

Seven consumer groups have filed complaints against Google with national regulators, alleging that user location tracking is in violation of GDPR.

2018-11-28

British Parliament Seizes Facebook Documents

Rarely used parliamentary powers have been used to demand that a US software firm hand over secret data and Facebook say they want it back.

2018-11-27

Google Helps Boost High Street Spending

Google has teamed up with start-up NearSt to help consumers see what is available in their local shops via the web.

2018-11-21

Journalists Aim To Detect Deepfakes

Across the media industry, news organisations can consider multiple approaches to help authenticate news stories if they suspect alterations.

2018-11-19

Delay, Deny and Deflect: How Facebook’s Leaders Fought Through Crisis

A bombshell report on Facebook management’s struggles to deal with data breaches, failures to protect privacy and electoral interference.

2018-11-19

Russian Internet Research Agency Has A New Propaganda Campaign

The Russian troll farm known as the Internet Research Agency has apparently been boasting of its exploits during the US midterm elections.

2018-11-15

Good News About Voting Security

America’s election infrastructure has never been more carefully monitored in the weeks, and months leading up to the nationwide vote.

2018-11-09

How To Avoid Facebook Phishing Scams

Criminals use a variety of methods to target Facebook users, but phishing scams are the most dangerous and potentially damaging.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Wilson Sonsini Goodrich & Rosati (WSGR)

Wilson Sonsini Goodrich & Rosati (WSGR)

WSGR is the premier provider of legal services to technology, life sciences, and growth enterprises worldwide. Practice areas include cybersecurity and data protection.

Cyber Future Foundation (CFF)

Cyber Future Foundation (CFF)

CFF was established to create a cyberspace where digital commerce and innovation can thrive based on trust and respect to individual privacy.

BlueVoyant

BlueVoyant

BlueVoyant's Cyber Defense Platform is security operations platform that provides real-time threat monitoring for networks, endpoints, and supply chains.

Bird & Bird

Bird & Bird

Bird & Bird is an international law firm with a focus on helping organisations being changed by technology and the digital world. Areas of expertise include cyber security.

Armis

Armis

Armis offers the markets leading asset intelligence platform designed to address the new threat landscape that connected devices create.

Swedish Board for Accreditation and Conformity Assessment (SWEDAC)

Swedish Board for Accreditation and Conformity Assessment (SWEDAC)

SWEDAC is the national accreditation body for Sweden. The directory of members provides details of organisations offering certification services for ISO 27001.

Billington CyberSecurity

Billington CyberSecurity

Billington CyberSecurity is a leading, independent education company with an exclusive focus on cybersecurity.

PreEmptive Solutions

PreEmptive Solutions

PreEmptive Protection hit the sweet spot between cost, convenience and functionality by helping you protect and secure your apps in a smarter way.

WidePoint

WidePoint

WidePoint Corporation is an innovative provider of Trusted Mobility Management (TM2) solutions.

Iron Bow Technologies

Iron Bow Technologies

Iron Bow Technologies is a leading IT solution provider dedicated to successfully transforming technology investments into business capabilities for government, commercial and healthcare clients.

Aurora Systems Consulting

Aurora Systems Consulting

Aurora is a Cybersecurity solutions provider with a portfolio consisting of security consulting, products and services that proactively prevent, secure and manage advanced threats and malware.

Elisity

Elisity

Elisity Cognitive Trust is a new security paradigm that combines Zero Trust Network Access and an AI-enabled Software Defined Perimeter.

Patriot Consulting Technology Group

Patriot Consulting Technology Group

Patriot Consulting's mission is to help our clients manage cybersecurity risk through secure deployments of Microsoft 365.

HYCU

HYCU

HYCU was born of the need to simplify data protection and provide equivalent levels of backup and recovery support across on premises, public cloud, and SaaS workloads.

Quantum Knight

Quantum Knight

Quantum Knight is the most performant commercial-grade embeddable cryptography. Lock down any resource from any location or device. Take control of your data now.

Mimic

Mimic

Mimic’s SaaS platform provides enterprises with detection, deflection, and rapid recovery from ransomware attacks.