TECHNOLOGY > Key Areas > Social Media


« Back to News

2019-01-21

Google Search Results Spoofed To Create Fake News

A spoofing technique that creates fake Google search results could be used in political influence campaigns or for other subversive purposes.

2019-01-05

Major US Newspapers Under Malware Attack

Several major newspaper titles suffered serious print and delivery disruption caused by targeted cyber-attacks originating outside the US.

2019-01-07

Prosecutors Sue Facebook Over Cambridge Analytica

Facebook faces a fine of up to $1.7 billion if all 340,000 instances are considered “violations” as Washington prosecutors press charges.

2018-12-31

Publishers Need Micro-Payments Now

Professional journalism is on a downward slope, driven by the growth of fake news, propaganda and personal blog opinion. What's to be done?

2018-12-24

Social Media Outpaces Print Newspapers In The US

Social media sites have surpassed print newspapers as a news source for Americans.

2018-12-19

US Senator Calls For New Cyber Doctrine

Sen. Mark Warner calls for a new US cyber doctrine designed to combat modern threats from hackers and disinformation campaigns.

2018-12-18

Three Ways Facebook Could Clean Up Its Act

Facebook, Twitter and other social media companies are causing society-wide damage. Here are three ideas to reduce the harm they do.

2018-12-14

Edward Snowden Calls For Google To Stay Out Of China

Edward Snowden adds his voice to human rights groups asking Google to back out of its plans to launch a censored search engine in China.

2018-12-07

Facebook CEO Zuckerberg Backed Sharing Customer Data

Zuckerberg questioned the business case for giving millions of outside software developers wide access to customer data, then endorsed it.

2018-12-11

Iran Using Websites To Spread Fake News

More than 70 websites found that push Iranian propaganda to 15 countries as part of a political influence operation.

2018-12-06

Fake Facebook Pages Account For 60% Of Social Network Phishing

Kaspersky's anti-phishing tools prevented 3.7m attempts to visit fraudulent social network pages in Q1. The majority were fake Facebook pages.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Morgan Lewis Law

Morgan Lewis Law

Morgan Lewis is an international law firm with offices in North America, Europe, Asia, and the Middle East. Practice areas include Privacy and Cybersecurity.

CloudCodes Software

CloudCodes Software

CloudCodes is a cloud security solutions provider focused on providing cloud security solutions to enterprise customers.

Identity Automation

Identity Automation

Identity Automation is a leading provider of Identity and Access Management software.

Cyber Akademie (CAk)

Cyber Akademie (CAk)

Cyber Akademie is a training and education center providing high-quality training and information events on information security and data protection.

Auth0

Auth0

Auth0 is a cloud service that provides a set of unified APIs and tools that instantly enables single sign-on and user management for any application, API or IoT device.

Intrusion

Intrusion

Intrusion provides IT professionals with the most robust tool set available for performing in-depth research and analysis of network traffic.

FoxGuard

FoxGuard

FoxGuard develops customized cyber security, compliance and industrial computing solutions for critical infrastructure entities and control system vendors.

BlueRiSC

BlueRiSC

BlueRiSC invent cutting-edge system assurance solutions for the 21st century with novel software and hardware designs focusing on security technologies that can be game changing.

Bigbee Technology

Bigbee Technology

Bigbee Technology are an IT solutions company based in Dar es Salaam founded by a group of professionals from around the globe.

CACI International

CACI International

CACI is at the forefront of developing and delivering technological breakthroughs that transform and optimize government operations.

Mainstream Technologies

Mainstream Technologies

Mainstream Technologies is an information technology services firm specializing in custom software development, managed IT services, cybersecurity services and hosting.

Certo Software

Certo Software

Certo are trusted experts in mobile security. At Certo, mobile security is not an afterthought, it’s what we do.

PreVeil

PreVeil

We started PreVeil to bring radically better security to ordinary business and personal communication and information storage.

OutKept

OutKept

OutKept offers the highest quality phishing simulation campaigns, supported by a community of ethical phishers, to build awareness, and maintain alertness.

Star Lab

Star Lab

Star Lab specializes in the development and productization of embedded security technologies.

Clutch Security

Clutch Security

Clutch Security are on a mission to secure all Non-Human Identities. Everywhere.