TECHNOLOGY > Key Areas > Social Media


« Back to News

2018-07-31

Facebook & Fake News

Critics claim that Facebook simply isn’t willing to make the hard choices necessary to tackle fake news.

2018-07-13

Fake News Is A Real Cybesecurity Risk

The viral nature of fake news does more than spread misinformation, it presents extensive cybersecurity risks that are not making the news.

2018-07-12

Fake Dating Apps Infiltrate Israeli Military

Hamas has a sophisticated spyware operation designed to trick Israeli Defense Force soldiers into downloading malicious apps.

2018-07-11

ICO Fine Facebook Half A Million Pounds

Facebook is to be fined £500,000 by the British ICO regulator, the maximum amount possible, for its part in the Cambridge Analytica scandal.

2018-06-25

Using Machine Learning To Spot Photoshopped Images

Adobe is using machine learning to make it easier to spot Photoshopped images. New research uses AI to automate traditional digital forensics.

2018-06-18

Facebook’s Head Of Policy Quits Amid Data Misuse Controversey

Facebook's Elliot Schrage is stepping down after a decade at the company, a rare departure among the senior ranks at the social network.

2018-06-12

Facebook Admits Privacy Settings 'Bug' Affects 14 Million Users

Bad To Worse: Forget about giving user data away to dodgy business partners, it looks like Facebook can't protect your privacy even when it wants to.

2018-06-08

Backlash: Facebook's Data-Sharing With Chinese Firms

Facebook draws further criticism from US legislators who are angry to learn about data sharing with suspectedly hostile Chinese firms.

2018-06-07

Facebook Gave Chinese Tech Firms Access To User Data

Facebook shares its user data with several Chinese tech firms, including Huawei and Lenovo, both suspected as risks to US national security.

2018-06-01

Countering Electoral Interference

Russia’s campaign targeting the 2016 US election shows the how deeply democratic processes can be undermined using communications technology.

2018-05-28

Spies Hack Journalism

A Leak. A Whistelblower. A Spy. In a world in which foreign intelligence services hack, leak and fabricate, journalists have to use extreme caution.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Seagate Technology

Seagate Technology

Seagate data storage systems are purpose-built for enterprise and data centre performance, scalability, reliability and security.

Competence Center for Applied Security Technology (CAST)

Competence Center for Applied Security Technology (CAST)

CAST offers a range of services in the field of secure modern information technology and a contact point for all questions regarding IT security.

National Cyber Summit (NCS)

National Cyber Summit (NCS)

The National Cyber Summit is the preeminent event for cyber training, education and workforce development aimed at protecting our nation's infrastructure from the ever-evolving cyber threat.

Aptible

Aptible

Aptible is a Platform as a Service (PaaS) that gives startups everything developers need to launch and scale apps and databases that are secure, reliable, and compliant.

Defendify

Defendify

We built Defendify to help small businesses navigate the cybersecurity landscape with cybersecurity that is dead simple, affordable, and works around the clock.

Nihon Cyber Defense

Nihon Cyber Defense

Nihon Cyber Defence’s mission is to provide robust solutions, services and support to governments, corporates and organisations in order to protect them from all forms of cyber warfare.

WolfSSL

WolfSSL

wolfSSL is an embedded SSL/TLS library providing secure communication for IoT, smart grid, connected home, routers, applications, games, phones, and more.

Motiv ICT Security

Motiv ICT Security

Motiv is the ICT security specialist that provides public and private sector organisations with IT security solutions and services to prevent cybercrime, data theft and data breaches.

Graylog

Graylog

Graylog provides answers to your team’s security, application, and IT infrastructure questions by enabling you to combine, enrich, correlate, query, and visualize all your log data in one place.

Silicon Labs

Silicon Labs

Silicon Labs are a leader in secure, intelligent wireless technology for a more connected world. We provide award-winning hardware and software security to help safeguard connected devices.

Phished

Phished

Phished is an AI-driven platform that focuses on the human side of cybersecurity. By combining fully automated training software with personalised, realistic simulations of cyberattacks.

PCS Security (PCSS)

PCS Security (PCSS)

PCS Security provides secure, reliable and state-of-the-art security solutions to help our customers address their security concerns.

Borwell

Borwell

Borwell delivers software and IT solutions to the UK MoD and to UK Government departments, which are secure by design.

QEDIT

QEDIT

QEDIT is leading the standardization of Zero-Knowledge Proofs through the ZKProof.org Workshops, and builds production-grade ZKP systems for blockchain.

CyberNut

CyberNut

CyberNut are a security awareness training solution built exclusively for schools.

Oak9

Oak9

Oak9's Security as Code platform dynamically secures Infrastructure as Code (IaC) and deployed cloud workloads, automatically.