TECHNOLOGY > Key Areas > Social Media


« Back to News

2023-02-20

Technology Is Disrupting Intelligence & Espionage

New Surveillance Tools Use AI & Quantum: The power balance in the spy world is changing and closed societies have gained the edge.

2023-02-10

Google Shuts Down Misinformation

Dragonbridge: Google's threat analysis group has terminated thousands of Chinese-linked accounts spreading disinformation across social media.

2023-01-06

EU Fines Meta $416m

Targeted Advertising: Ireland's Data Commissioner rules that Meta used peoples' data for adverts on Facebook and Instagram unlawfully.

2023-01-03

Meta Pays $725M To Settle Facebook Privacy Suit

Facebook’s parent company Meta has agreed to settle a US lawsuit following 2018 revelations that Facebook illegally shared data of 87m users.

2022-12-29

US Bans Government Users From Using TikTok

The Senate has passed a bill that bans federal employees from using the Chinese-owned TikTok app on devices provided by the government. 

2022-12-29

France Fines Microsoft For Privacy Breaches

Fined $64 Million: Microsoft's search engine Bing was operating with a system that did not allow users to easily get out of cookie collection.

2022-12-15

Congress Wants To Ban TikTok

Anti-Social Act: "TikTok collects data on tens of millions of American every day... We know it’s used to manipulate feeds and influence elections"

2022-12-03

Trump Turns Down Twitter

Elon Musk says that former US President Donald Trump's account has been reinstated after users narrowly backed the move. Trump says No.

2022-11-23

Facial Recognition Technology Might Place Children At Risk

Personal Privacy: Online facial recognition search engine PimEyes allows anyone to search for images of children scraped from the Internet.

2022-11-21

Google Ordered To Pay $391m To Settle Privacy Violations

Covert Location Tracking Since 2014: Google has agreed to pay $391.5m (£330m) to settle allegations about how it collected data from US users.

2022-11-08

Does Elon Musk Owning Twitter Increase Cyber Security Risks?

US legislators want an inquiry to investigate national security concerns raised by Saudi Arabia’s role in Musk's $44 billion takeover of Twitter.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NGS (UK)

NGS (UK)

NGS (UK) Ltd are independent, vendor agnostic, next generation security trusted advisors, providing all-encompassing solutions from the perimeter to the endpoint.

Euro-Recycling

Euro-Recycling

Euro-Recycling is a leading UK provider of Secure On-Site Data Media Destruction Services.

Utility Cyber Security Forum

Utility Cyber Security Forum

The Utility Cyber Security Forum offers a focused venue in which utility executives can network one-on-one with colleagues facing issues in protecting against cyber attacks.

Quantum Security

Quantum Security

Quantum's game-changing approach to cybersecurity brings you performance and peace-of-mind, with a raft of additional benefits: it's non-proprietary, comprehensive, scalable, and affordable.

Appgate

Appgate

Appgate is the secure access company. We empower how people work and connect by providing solutions purpose-built on Zero Trust security principles.

Research Institute in Verified Trustworthy Software Systems (VeTSS)

Research Institute in Verified Trustworthy Software Systems (VeTSS)

The main purpose of VeTSS is to support program analysis, testing and verification, to achieve guarantees of software correctness, safety, and security.

Dashlane

Dashlane

Dashlane puts all your passwords, payments, and personal info in one place that only you control. So you can use them instantly. Securely. Exactly when you need them.

BreachLock

BreachLock

Breachlock delivers the most comprehensive Penetration Testing as a Service (PtaaS) powered by Certified Hackers and AI.

Kocho

Kocho

Kocho (formerly TiG) is a provider of identity and access, cyber security, cloud transformation, and managed IT services.

7layers

7layers

7layers has established itself as one of the world’s leading test house groups for mobile devices and the growing number of wireless devices, modules and chipsets.

IronClad Encryption (ICE)

IronClad Encryption (ICE)

Ironclad Encryption is Dynamic Encryption. The encryption sequence changes continuously so there is never a correlation between data sent and data received.

Truly Secure

Truly Secure

Truly Secure is an IT Service Provider that ensures greater efficiency and security within a company's technological environment.

Darktrace

Darktrace

Darktrace is a global leader in cybersecurity AI, delivering complete AI-powered solutions in its mission to free the world of cyber disruption.

PatchAdvisor

PatchAdvisor

PatchAdvisor core services include Vulnerability Assessments/Penetration Testing, Application Vulnerability Assessments, and Incident Response.

Incode

Incode

Incode is the leading provider of world-class identity solutions that is reinventing the way humans authenticate and verify their identities online.

NOYB

NOYB

NOYB is a non-profit organization aiming to close the gap between privacy laws and the reality of corporate practice.