TECHNOLOGY > Key Areas > Social Media


« Back to News

2021-10-07

Leaked Facebook Documents Reveal Discriminatory Practices

Celebrities, politicians and high-profile Facebook users have different rules governing what content they can post, compared to 'ordinary' users.

2021-10-06

Facebook Weakens Democracy & Harms Children

A former Facebook product manager tells US lawmakers the tech giant's apps "harm children, stoke division and weaken our democracy".

2021-10-05

Facebook, WhatsApp & Instagram Suffer Massive Outage

Facebook's social media platform, WhatsApp and Instagram all simultaneously went down for six hours overnight but are now back up and running.

2021-09-28

Telegram Is Where Cyber Criminals Do Business

A rapidly growing network of criminals are using the encrypted messaging app Telegram to buy, sell and share stolen data and hacking tools.

2021-09-07

Russian Trolls Target News Websites

A major operation to influence public opinion which saw fake comments posted on Western media in support of Russian interests is confirmed.

2021-08-31

Social Media Tries To Protect Afghan Users

Facebook, Twitter and LinkedIn have moved to secure the accounts of users worried for their safety under the Taliban regime in Afghanistan.

2021-08-26

Islamic State Propaganda Is Persistent

Jihadist terrorist groups dedicate significant efforts to set up effective online communication campaigns and they are definitely not going away.

2021-08-23

Seven Ways That Social Media Sabotages Cyber Security

Warning: Having a social media webpage affects your cyber security. Although social media can do a lot for you, it can also take a lot away from you.

2021-08-18

Facebook Bans The Taliban

The Taliban presents a fresh challenge for social media companies over content created by the Islamic group, considered by many to be terrorists.

2021-08-18

The Taliban's Mastery Of Information Warfare

The Taliban have used modern information warfare techniques, combining fake accounts and bots, to successfully undermine the Afghan government.

2021-11-12

Cyber Operations In Wartime

Policymakers and military leaders need to broaden their assumptions about how state and non-state actors will use cyber operations in future conflicts.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Asavie

Asavie

Asavie provide solutions for Enterprise Mobility Management and secure IoT Connectivity.

Airbus Cybersecurity

Airbus Cybersecurity

Airbus CyberSecurity is a European specialist in cyber security. Our mission is to protect governments, military and critical national infrastructure enterprises from cyber threats.

Bottomline Technologies

Bottomline Technologies

Bottomline Technologies is an innovator in business payment automation technology, helping companies make complex business payments simple, smart and secure.

Lirex

Lirex

Lirex offer consulting and outsourcing services, complete design, construction and maintenance of ICT solutions and systems including cybersecurity.

Pryv

Pryv

Pryv is a Swissmade software for privacy, personal data collection, usage, sharing and storage.

Indeed

Indeed

Indeed is a worldwide employment-related search engine for job listings covering job types in all industries, including cybersecurity.

International Cybersecurity Institute (ICSI)

International Cybersecurity Institute (ICSI)

ICSI is a UK company offering specialized and accredited professional qualifications in cybersecurity for young IT graduates as well as mature professionals.

Informatics International

Informatics International

Informatics is a leading ICT provider in Sri Lanka, providing cutting-edge software & infrastructure solutions and services including cyber security.

Cympire

Cympire

Cympire significantly increases an organisation’s Cyber Resilience through continuous Training and Assessment. Cyber Security Training Platform. Cloud-based and fully customizable Cyber Range.

Turnkey Consulting

Turnkey Consulting

Turnkey Consulting is a leading provider of Integrated Risk Management (IRM), Identity Access Management (IAM), and Cyber and Application Security.

Flawnter

Flawnter

Flawnter is a security testing software that finds hidden security and quality flaws in your applications.

DART Consulting & Training

DART Consulting & Training

DART is a leading cyber training and consultancy company. We enhance our clients’ cyber capabilities by growing and strengthening their frontline defense – the cyber teams.

Manifest

Manifest

Manifest is a cybersecurity company dedicated to helping enterprises secure their software supply chains.

Airbus Protect

Airbus Protect

Airbus Protect is an Airbus subsidiary bringing together the Company’s expertise in cybersecurity, safety and sustainability-related services.

CIS Secure

CIS Secure

CIS Secure is an innovator, integrator and expert advisor supporting the broadest portfolio of powerful, mission-specific C5ISR communications and cybersecurity solutions.

Deimos

Deimos

Deimos is a technology, cloud, hybrid and multi-cloud focused, professional services company. Our expertise and focus is on cloud native Developer and Security Operations.