TECHNOLOGY > Key Areas > Social Media


« Back to News

2019-08-09

FBI Turns To Social Media To Track Shooters

The US is growing used to the painful reality of the weaponisation of social media to cause harm. Now the FBI want to use it as an alerting tool.

2019-08-07

Fraudsters Target Social Media Influencers

Social media 'influencers' and other celebrities are being duped into endorsing bogus products, services and fake investment opportunities.

2019-07-29

Malware Delivery Via LinkedIn

A Phishing campaign using LinkedIn network invitations to deliver malicious documents included the use of three new malware families.

2019-07-23

Privacy: Can You Trust FaceApp With Your Face?

Smartphone software used to simulate the ravages of time upon users' features is at the centre of a global cybersecurity row over its Ts&Cs.

2019-06-24

Spies Use AI-Generated Faces To Connect With Targets

Fake Faces: A vast army of phantom profiles are lurking on LinkedIn, the popular website used for professional networking.

2019-06-07

Jamie Bartlett: Tech Will Change Us

The respected commentator and analyst Jamie Bartlett is exploring the political and social impacts of technology. His conclusions are worrying.

2019-06-11

Iranian Fake News Websites Exposed

'Endless MayFly' is an Iran-aligned network of inauthentic websites and online personas used to spread false and divisive information.

2019-05-22

Five Tech Giants Promise To Stop Terrorist Content

Facebook, Amazon, Google, Twitter and Microsoft agree to develop shared tools to detect and remove terrorist or extremist content.

2019-06-05

Digital Advertising Is A $Billion Ripoff

Internet advertising revenues are booming, worth over $100 billion in the US alone, but lying behind this is a hotbed of malware and fraud.

2019-05-30

Facebook Sues Rankwave For Data Misuse

Attempting to show it is serious about privacy, Facebook is suing a firm it accuses of unlawfully using its data to sell marketing and advertising.

2019-05-30

Limit The Duration Google Holds Your Data

Google has told developers that it will focus on security and privacy features, allowing users to place settings on how long their data is stored.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Hack in the Box Security Conference (HitBSecConf)

Hack in the Box Security Conference (HitBSecConf)

HITBSecConf is a platform for the discussion and dissemination of next generation computer security issues. Our events feature two days of training and a two-day multi-track conference

Critical Infrastructures for Information and Cybersecurity (ICIC)

Critical Infrastructures for Information and Cybersecurity (ICIC)

ICIC addresses the demand for cybersecurity for National Public Sector organizations and civil and private sector organizations in Argentina.

Intensity Analytics

Intensity Analytics

Intensity Analytics is a software firm that develops next-generation, physical user and entity behavioral authentication ("physical UEBA") security software technology.

TCDI

TCDI

TCDI specializes in computer forensics, eDiscovery and cybersecurity services.

Achtwerk

Achtwerk

Achtwerk manufacture the security appliance IRMA for critical infrastructures and networked automation in production plants.

Pryv

Pryv

Pryv is a Swissmade software for privacy, personal data collection, usage, sharing and storage.

Stealth-ISS Group

Stealth-ISS Group

Stealth–ISS Group is your extended IT, cyber security, risk and compliance team, providing strategic guidance, engineering and audit services, along with technical remediation and security operations.

Experis

Experis

Experis provide IT resourcing, project solutions and managed services. We enable organizations to cultivate individuals and teams prepared for the digital age.

Thistle Technologies

Thistle Technologies

Thistle Technologies is building tools that help connected device manufacturers build security resiliency into devices.

Periculus

Periculus

Periculus makes managing digital risk simple. Its integrated platform offers access to purchase cyber insurance and cyber security solutions uniquely tailored to fit the needs of every business.

NorthRow

NorthRow

NorthRow provides digital transformation compliance solutions to help businesses manage regulatory and financial crime risks.

GoPro Consultants

GoPro Consultants

GoPro Consultants is an IT Consultancy and IT Managed services provider Globally with immeasurable expertise of IT professionals in Hardware/Support & Consultancy and Project Planning.

Memcyco

Memcyco

Memcyco is a provider of cutting-edge digital trust technologies to empower brands in combating online brand impersonation fraud, and preventing fraud damages to businesses and their clients.

Control D

Control D

Control D is a modern and customizable DNS service that blocks threats, unwanted content and ads - on all devices.

ESProfiler

ESProfiler

Enterprise Security Profiler. Empowering CISOs with clarity & confidence in their security programme by visualising capabilities, usage and spend against their key threat priorities.

itm8

itm8

itm8 is a Nordic digital transformation partner offering a wide range of services in IT operations and Cloud Services, Digital Transformation, Application Services, ERP, and Cyber Security.