TECHNOLOGY > Key Areas > Social Media


« Back to News

2019-07-29

Malware Delivery Via LinkedIn

A Phishing campaign using LinkedIn network invitations to deliver malicious documents included the use of three new malware families.

2019-07-23

Privacy: Can You Trust FaceApp With Your Face?

Smartphone software used to simulate the ravages of time upon users' features is at the centre of a global cybersecurity row over its Ts&Cs.

2019-06-24

Spies Use AI-Generated Faces To Connect With Targets

Fake Faces: A vast army of phantom profiles are lurking on LinkedIn, the popular website used for professional networking.

2019-06-07

Jamie Bartlett: Tech Will Change Us

The respected commentator and analyst Jamie Bartlett is exploring the political and social impacts of technology. His conclusions are worrying.

2019-06-11

Iranian Fake News Websites Exposed

'Endless MayFly' is an Iran-aligned network of inauthentic websites and online personas used to spread false and divisive information.

2019-05-22

Five Tech Giants Promise To Stop Terrorist Content

Facebook, Amazon, Google, Twitter and Microsoft agree to develop shared tools to detect and remove terrorist or extremist content.

2019-06-05

Digital Advertising Is A $Billion Ripoff

Internet advertising revenues are booming, worth over $100 billion in the US alone, but lying behind this is a hotbed of malware and fraud.

2019-05-30

Facebook Sues Rankwave For Data Misuse

Attempting to show it is serious about privacy, Facebook is suing a firm it accuses of unlawfully using its data to sell marketing and advertising.

2019-05-30

Limit The Duration Google Holds Your Data

Google has told developers that it will focus on security and privacy features, allowing users to place settings on how long their data is stored.

2019-05-28

Facebook Deserves To Be Broken-Up

An original collaborator with Mark Zuckerberg has turned against the giant social media platform that he helped create, over extremist content.

2019-05-15

Britain To Initiate Online “Porn Ban’

The UK government intends to implement a “Porn Ban” nationwide on July 15, restricting access to online pornography for under 18s. But will it work?

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Palo Alto Networks

Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate.

Avatu

Avatu

Avatu specialise in providing clients the advice, technology and tools they need to fight cyber and insider threats.

Proact IT Group

Proact IT Group

Proact is Europe's leading independent data centre and Cloud services enabler. We deliver flexible, accessible and secure IT solutions and services.

Cyphercor

Cyphercor

Cyphercor is a leading smartphone and desktop-based two-factor authentication (2FA) provider.

Dual Layer IT Solutions

Dual Layer IT Solutions

Dual Layer offer a full range of IT Services and Solutions for businesses from IT infrastructure design to cloud/hosted solutions, cybersecurity, disaster recovery and IT training.

Secure IT Disposals

Secure IT Disposals

Secure IT Disposals specialise in professional Computer Recycling, Computer Disposals, Computer Destruction, Data Erasure and end-of-lifecycle solutions.

Cyber Security & Cloud Expo

Cyber Security & Cloud Expo

The Cyber Security & Cloud Expo is an international event series in London, Amsterdam and Silicon Valley.

Highland Capital Partners

Highland Capital Partners

Highland Capital Partners is an early stage venture capital firm focused on category-defining businesses in consumer and enterprise technology, including cybersecurity.

Calyptix Security

Calyptix Security

Calyptix Security helps small and medium offices secure their networks so they can raise profits, protect investments, and control technology.

ValueMentor

ValueMentor

ValueMentor is a leading cyber security service provider in the Middle East. We enable clients to reduce risk by taking a strategic approach to cybersecurity.

Sec-Ops

Sec-Ops

Sec-Ops is a forward thinking cyber security company, formed by a group of security enthusiasts with years of experience and backgrounds in the technology and the government industries.

BlockSec

BlockSec

BlockSec is dedicated to building blockchain security infrastructure. The team is founded by top security researchers and experiencedexperts from both academia and industry.

ProArch

ProArch

ProArch is a global team of multidisciplinary experts in cloud, infrastructure, data analytics, cybersecurity, compliance, and software development.

Turngate

Turngate

Turngate simplify security investigations so you can see employee activities and entitlements in your enterprise in seconds.

TriVigil

TriVigil

TriVigil offer a full-service, comprehensive cybersecurity approach specifically tailored to meet the unique needs of educational institutions.

Mode

Mode

Mode is an out-of-band communication and crisis collaboration platform. One platform to manage your cyber crisis response. Stay connected when it's needed most.