TECHNOLOGY > Key Areas > Social Media


« Back to News

2018-10-01

UK Newspaper Industry Demands Levy On Tech Firms

The British newspaper industry thinks that the government should force social media platforms like Facebook and Google to pay for journalism.

2018-10-01

Major Facebook Breach: 50m Users Compromised

An attacker can take full control of the victim’s account, including logging into third-party applications that use Facebook Login.

2018-09-24

British Government Is Planning Internet Regulation

New rules would involve producing a single legal framework for internet safety and increasing the legal liability for sites with illegal content.

2018-09-13

Will Russian Hackers Affect this Year's US Election?

Once again, hackers on the outside of the American political system were probing for a way in to exert a malign influence on elections.

2018-09-07

British Airways Fake Facebook Page

The bogus “British Airways Holidays”page steals personal data by claiming you can win holidays and free air travel by clicking a “Sign Up” button.

2018-09-10

Widepsread Campaign Hacking Instagram Accounts

The hack sees account names, profile pictures, passwords and email addresses changed with new data originating from a Russian provider.

2018-09-04

Iranian Political Influence Campaign Goes Global

Iranian influence operations targeting internet users worldwide are significantly bigger than previously identified.

2018-08-06

Facebook Fakers Get Better At Covering Tracks

Creators of fake accounts and news pages on Facebook are learning from their mistakes and making themselves harder to track and identify.

2018-08-23

Phone Calls, Texts Or Email - How Do Millennials Communicate?

The fundamentals of good communication don’t change between generations, but personal voice communications are slipping down the priority list.

2018-08-24

Facebook & Instagram Now Show How Long You Use Them

Giving users a raw count of the minutes they’ve spent in their apps plus their average usage is a good start to making users more mindful.

2018-07-30

Facebook Loses $123 Billion In Value

It seems the social media giant's previously inexorable market growth and its euphoric market valuation are both at the point of stalling.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Micro Systemation AB (MSAB)

Micro Systemation AB (MSAB)

MSAB is a leader in the provision of forensically secure tools for the extraction and analysis of data from mobile devices.

Gigamon

Gigamon

Gigamon provides intelligent Traffic Visability solutions that provide unmatched visbility into physical & birtual networks without affecting the performance or stability of production environments.

King & Spalding

King & Spalding

King & Spalding is an international law firm with offices in the United States, Europe and the Middle East. Practice areas include Data, Privacy & Security.

Ntrepid

Ntrepid

Ntrepid products provide protection from web threats and enable organizations to safely conduct their online activities.

MER Group

MER Group

MER Group is a world-leading solutions provider specializing in Homeland Security (HLS), Cyber and Intelligence, Communication Infrastructure and Tactical Communication Systems.

Abnormal Security

Abnormal Security

Abnormal is an API-based email security platform providing protection against the entire spectrum of targeted email attacks.

swIDCH

swIDCH

swIDch is a technology company that aims to eliminate CNP (card not present) Fraud.

Adarma Security

Adarma Security

Adarma are specialists in threat management including SOC design, build & operation.

PCI Security Standards Council (PCI SSC)

PCI Security Standards Council (PCI SSC)

The PCI Security Standards Council is a global forum that brings together payments industry stakeholders to develop and drive adoption of data security standards and resources for safe payments.

Saiflow

Saiflow

SaiFlow provides a tailor-made cybersecurity solution for Electric Vehicles Charging Infrastructure (EVCI), Distributed Energy Resources (DERs) and energy networks and assets.

Saidot

Saidot

Saidot is a Finnish AI governance and alignment company committed to helping businesses safely and transparently integrate AI into their operations.

Abstract Security

Abstract Security

Abstract Security has created a revolutionary platform, equipped with an AI-powered assistant, to better centralize the management of security analytics.

HTX (Home Team Science & Technology Agency)

HTX (Home Team Science & Technology Agency)

HTX brings together science and engineering capabilities to transform the homeland security landscape and keep Singapore safe.

NetAlly

NetAlly

NetAlly network test solutions help engineers and technicians better deploy, manage, maintain, and secure today’s complex wired and wireless networks.

Axiotrop

Axiotrop

AXIOTROP is a Cybersecurity firm offering leading services in assessment, remediation, and validation to protect the confidentiality, integrity, and availability of regulated information.

Cyver Core

Cyver Core

Cyver Core is a pentest management and pentest report automation platform that consolidates cybersecurity work, automates overhead, and frees cybersecurity professionals up for the work that matters.