TECHNOLOGY > Key Areas > Social Media


« Back to News

2021-10-07

Leaked Facebook Documents Reveal Discriminatory Practices

Celebrities, politicians and high-profile Facebook users have different rules governing what content they can post, compared to 'ordinary' users.

2021-10-06

Facebook Weakens Democracy & Harms Children

A former Facebook product manager tells US lawmakers the tech giant's apps "harm children, stoke division and weaken our democracy".

2021-10-05

Facebook, WhatsApp & Instagram Suffer Massive Outage

Facebook's social media platform, WhatsApp and Instagram all simultaneously went down for six hours overnight but are now back up and running.

2021-09-28

Telegram Is Where Cyber Criminals Do Business

A rapidly growing network of criminals are using the encrypted messaging app Telegram to buy, sell and share stolen data and hacking tools.

2021-09-07

Russian Trolls Target News Websites

A major operation to influence public opinion which saw fake comments posted on Western media in support of Russian interests is confirmed.

2021-08-31

Social Media Tries To Protect Afghan Users

Facebook, Twitter and LinkedIn have moved to secure the accounts of users worried for their safety under the Taliban regime in Afghanistan.

2021-08-26

Islamic State Propaganda Is Persistent

Jihadist terrorist groups dedicate significant efforts to set up effective online communication campaigns and they are definitely not going away.

2021-08-23

Seven Ways That Social Media Sabotages Cyber Security

Warning: Having a social media webpage affects your cyber security. Although social media can do a lot for you, it can also take a lot away from you.

2021-08-18

Facebook Bans The Taliban

The Taliban presents a fresh challenge for social media companies over content created by the Islamic group, considered by many to be terrorists.

2021-08-18

The Taliban's Mastery Of Information Warfare

The Taliban have used modern information warfare techniques, combining fake accounts and bots, to successfully undermine the Afghan government.

2021-11-12

Cyber Operations In Wartime

Policymakers and military leaders need to broaden their assumptions about how state and non-state actors will use cyber operations in future conflicts.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Security House

IT Security House

IT Security House is a leading European supplier of Cyber Security Intelligence and eCrime services.

KLC Consulting

KLC Consulting

KLC Consulting offers information assurance / Security, IT Audit, and Information Technology products and services to government and Fortune 1000 companies.

Ten Eleven Ventures

Ten Eleven Ventures

Ten Eleven is a specialized venture capital firm exclusively dedicated to helping cybersecurity companies thrive.

Option3

Option3

Option3 (formerly Option3Ventures - O3V) primarily seek control investments in the growing cybersecurity mid-market, seeking to build champions with the scale to bring cutting-edge products to market.

36 Group

36 Group

36 Group's criminal law team, has the experience and specialist knowledge to conduct effectively trials heavily concerned with the growing phenomenon of Cybercrime.

DAtAnchor

DAtAnchor

Anchor is simply a better way to protect and control sensitive data. Zero-trust, data-centric security. Simplified.

Almond

Almond

Almond is positioned as a key independent French player in audit and consulting in the fields of Cybersecurity, Cloud and Infrastructure.

nsKnox

nsKnox

nsKnox is a fintech-security company, enabling corporations and banks to prevent fraud and ensure compliance in B2B Payments.

watchTowr

watchTowr

Continuous Attack Surface Testing, with the watchTowr Platform. The future of Attack Surface Management.

Seraphic Security

Seraphic Security

Seraphic Security provides attack protection to enable safe browsing for employees or contractors, as well as advanced governance controls to enforce enterprise policies across devices.

Total Secure Technology

Total Secure Technology

Total Secure Technology provides trusted Managed IT Security and Managed IT Services for organizations looking to increase their cybersecurity defensive posture.

Nortal

Nortal

Nortal is a strategic digital transformation partner for leading companies and governments around the world.

DHCO IT

DHCO IT

The DHCO IT team are experts in IT support, cyber security, cloud support and disaster recovery, and are Microsoft 365 partners.

Inroad Technologies

Inroad Technologies

Inroad Technologies provide IT services that help keep your business computers, servers and networks secure and trouble-free.

Integrated Cyber Solutions (ICS)

Integrated Cyber Solutions (ICS)

Integrated Cyber Solutions is a managed security service provider that humanizes cybersecurity managed services to the Small-to-Medium Business (SMB) and Small-to-Medium Enterprise (SME) sectors.

Secomea

Secomea

Secomea redefines manufacturing plant security by combining internationally recognized industry best practices as critical components of our robust cybersecurity strategy.