TECHNOLOGY > Key Areas > Social Media


« Back to News

2022-04-25

Half Of Phishing Emails Target LinkedIn Accounts

User Beware: The professional networking website is one of the most popular brands targeted by cyber criminals in phishing attacks.

2022-04-21

Algorithms, Lies & Social Media

Achieving a more transparent and less manipulative online media may well be the defining political battle of the 21st century.

2022-04-06

The Metaverse Will Have An Impact On Privacy & Security

As augmented reality platforms develop into the Metaverse, users are going to be presented with entirely new categories of security risk.

2022-04-08

The British Online Harms Bill Takes Shape

There will be new rules for social media and the regulator Ofcom will have powers to fine firms or block access to sites that fail to comply.

2022-04-05

Zelensky Deepfake Tells Ukrainians To ‘lay down arms’

Don't Be Fooled: The deepfake purports to show President Zelensky declaring that Ukraine has “decided to return Donbas” to Russia.

2022-03-30

Australia Sues Facebook Over Scam Advertising

Facebook & Australia Have History: Now the governnment has accused the social media platform of misconduct in running fake crypto adverts.

2022-03-19

Georgia Must Bolster Resilience To Information Warfare

The invasion of Ukraine has important lessons for the ex- soviet republic of Georgia, which now urgently needs to tackle Russian disinformation.

2022-03-21

In Britain 'Cyberflashing’ Is Now A Crime

Sending unsolicited sexual images via social media, dating apps, as well as data sharing tools like Bluetooth and Airdrop, will get two years in jail.

2022-03-21

The App At The Frontline Of Information Warfare

Telegram enables Russian citizens to access first-hand information, news & video from war scenes in Ukraine, that run counter to Russian propaganda.

2022-03-21

Facebook Allows Calls for Violence Against Russian Leaders

Extreme: Facebook and Instagram will allow users to call for violence against Vladimir Putin and Russian soldiers over Ukraine’s invasion.

2022-03-21

Ukraine's 'IT Army' Risks Being Hijacked By Malware

A malware campaign is exploiting people's willingness to support Ukraine against Russian invasion to infect them with malicious Trojans.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

SSLGURU

SSLGURU

SSLGURU bring all of the major SSL certificate vendors to one market place in order to create the world's largest SSL store with the most competitive prices.

360Logica

360Logica

360Logica is a software testing company offering numerous kinds of testing services to improve the quality and performance of your software and IT systems.

RATEL (SRB-CERT)

RATEL (SRB-CERT)

RATEL has been appointed as the National Center for the Prevention of Security Risks in ICT systems of the Republic of Serbia (SRB-CERT).

Cytomic

Cytomic

Cytomic is the business unit of Panda Security specialized in providing advanced cybersecurity solutions and services to large enterprises.

SecuLetter

SecuLetter

SecuLetter is able to detect unknown attacks with hybrid approaches, static and dynamic analysis.

AXELOS

AXELOS

AXELOS develops best practice frameworks and methodologies used globally by professionals working primarily in IT management and cyber resilience.

Neudomains

Neudomains

Neudomains is a Corporate Domain Name Management and Brand Protection Online Specialist. One of the world's top providers of online brand protection and enforcement.

Stamus Networks

Stamus Networks

Stamus Networks offers Scirius Security Platform solutions that marry real-time network traffic data with enhanced Suricata intrusion detection (IDS) and an advanced analytics engine.

Kiuwan

Kiuwan

Kiuwan provide software security solutions with SAST and SCA source-code analysis that fit into your DevOps process.

CISO Global

CISO Global

CISO Global (formerly Cerberus Sentinel) are on a mission to demystify and accelerate our clients’ journey to cyber resilience, empowering organizations to securely grow, operate, and innovate.

Cigent Technology

Cigent Technology

Cigent keeps the most valuable asset in your organization safe—your data. Our advanced endpoint and managed network security solutions prevent ransomware and data theft.

PT Sydeco

PT Sydeco

At PT SYDECO we create a complete range of products that secure computer and industrial networks, servers, programs and data against any type of computer attack.

HALOCK Security Labs

HALOCK Security Labs

HALOCK is an information security consultancy providing both strategic and technical security offerings.

rSolutions

rSolutions

rSolutions delivers managed cybersecurity services to clients in many industry sectors including financial services, telecommunications, energy, government and retail.

ThreatFabric

ThreatFabric

ThreatFabric integrates industry-leading threat intel, behavioral analytics, advanced device fingerprinting and over 10.000 adaptive fraud indicators.

CaseMatrix

CaseMatrix

Discover a new era of legal intelligence with CaseMatrix. We identify potential class action cases arising from cyber incidents and data breaches.