TECHNOLOGY > Key Areas > Social Media


« Back to News

2022-08-02

For Sale: 5.4m Twitter Users’ Data

Devil In The Detail: The information for sale allegedly comprises phone numbers & email addresses, including celebrities and numerous companies.

2022-07-21

Companies Going To War On Social Media

Social media is increasingly being used by businesses to spread misinformation, or downright lies, to discredit their commercial rivals.

2022-07-12

Elon Musk Isn't Buying Twitter

Musk says he wants to back out of the $44B deal because Twitter has failed to provide enough information about fake & spam accounts. 

2022-07-06

Google Improves Password Manager Platform Security

Google Password Manager users now have the same experience on Chrome, Android and iPhone and can manage their passwords using iOS.

2022-06-27

Murder Enabled By Social Media

Instagram & Snapchat: British schoolchildren lured a 13-year-old to a park where he was stabbed to death were motivated by images on social media.

2022-06-14

Elon Musk, YouTube & Bitcoin

Crypto Fraud: YouTube is being criticised for failing to tackle a network of cyber criminals streaming fake Elon Musk videos to steal from viewers.

2022-06-21

Social Media Platforms Must Protect Women Online

The British regulator says women are heavier users of social media platforms than men and is urging technology firms to keep women safer online.

2022-06-07

US Supreme Court Blocks Texas Law On Social Media ‘Censorship’

Social Media campaigners claimed that Texas would have turned Facebook, Twitter & YouTube into "havens of the vilest expression imaginable".

2022-05-31

Twitter Fined $150m For Selling User Data

While Twitter had undertaken not to give personal information about users to advertisers, the social media company broke its promise. 

2022-05-17

Elon Musk's Deal To Buy Twitter Comes To A Standstill

Twitter is having problems calculating just how many fake accounts are on their platform and it could be Elon Musk wants to renegotiate the terms.

2022-05-13

Wanted: Access To Social Media Data

Despite its enormous influence and large scale manipulation by malicious actors, Social Media remains opaque and resistant to detailed analysis.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CNCERT/CC

CNCERT/CC

CNCERT is the national Computer Network Emergency Response Technical Team / Coordination Center of China.

CLUSIL

CLUSIL

CLUSIL is an association for the information security industry in Luxembourg.

Dubex

Dubex

Dubex is Denmark's leading business-oriented IT security specialist.

AMETIC

AMETIC

AMETIC, is the Association of Electronics, Information and Communications Technologies, Telecommunications and Digital Content Companies in Spain.

Tempered Networks

Tempered Networks

Tempered Networks delivers the first purpose-built platform for IIoT cybersecurity that allows customers to connect and secure devices in minutes without the need for specialized skills.

ANIS

ANIS

ANIS represents the interests of Romanian IT companies and supports the development of the software and services industry.

LiveVault

LiveVault

LiveVault delivers fully automated, turnkey, backup over the Internet or a private network connection for uninterrupted remote data protection.

Checksum Consultancy

Checksum Consultancy

Checksum Consultancy specializes in Information security, Risk management, and IT governance.

Glilot Capital Partners

Glilot Capital Partners

Glilot Capital Partners is an Israeli seed and early-stage VC. We specialize in businesses which disrupt enterprise technology, mainly in the fields of AI, big data and cybersecurity.

Cyber Security Operations Consulting (CyberSecOp)

Cyber Security Operations Consulting (CyberSecOp)

CyberSecOp is an ISO 27001 Certified Organization which provides cyber security operations services and risk management consulting.

Bionic

Bionic

Bionic is an agentless way to get control over your increasingly complex applications so you can manage, operate, and secure them faster and more efficiently.

PROW Information Technology

PROW Information Technology

PROW is at the forefront of the technology and digital revolution with a focus and mastery in the cybersecurity, information security and data management realms.

CyberGate Technologies

CyberGate Technologies

CyberGate Technologies is a world-class, customer focus cyber security service and consultancy company operating the UK, Europe, Middle East, and Africa.

Association for Uncrewed Vehicle Systems International (AUVSI)

Association for Uncrewed Vehicle Systems International (AUVSI)

AUVSI is the world's largest nonprofit organization dedicated to the advancement of uncrewed systems and robotics. Focus areas include cyber security for uncrewed systems and robotics.

Royal United Services Institute (RUSI)

Royal United Services Institute (RUSI)

The Royal United Services Institute is an independent think tank engaged in cutting edge defence and security research. Areas of research include cyber security and resilience.

APCERT

APCERT

APCERT cooperates with CERTs and CSIRTs to ensure internet security in the Asia Pacific region, based around genuine information sharing, trust and cooperation.