TECHNOLOGY > Key Areas > Social Media


« Back to News

2023-04-27

Facebook Delivers Fake Reviews

Research by consumer group Which? shows that there are many fake review factories on Facebook - despite the risk of fines from regulators.

2023-04-27

Violent Indian Separatists Using Twitter Bots

Recent research reveals pro-Khalistani Sikh groups using Twitter bots to promote violence and anti-India propaganda across social media.

2023-04-24

Musk Threatens To Sue Microsoft

Charging For User Data: Twitter's owner Elon Musk is threatening to sue Microsoft as he accused the technology giant of misusing user data.

2023-04-24

Facebook Users In Line For $725m Payout

Cambridge Analytica Data Privacy Settlement: Facebook users could receive a share of a $multimillion settlement in a successful privacy lawsuit.

2023-04-12

US Threatens National Ban On TikTok

Owner ByteDance Under Pressure To Sell: A US ban on the world’s most popular social media app would affect 150 million using the platform.

2023-04-17

Social Media’s Impact On The War In Ukraine

Second Front: The big tech companies are involved in the conflict, both as tools of propaganda, as facilitators of communication and collaboration.

2023-03-28

Russia's Disinformation Campaign Targets Ukraine's Supporters

More than sixty 'lookalike' fake news websites set up to pass off as legitimate Western newspapers used to deliver fake news on social media.

2023-03-28

TikTok’s CEO Interrogated Over Data Privacy

The short-form video app TikTok has many millions of US users, raising suspicion that their data could be accessed by the Chinese government. 

2023-03-20

WhatsApp Will Not Comply With British Regulations

WhatsApp would refuse to remove its end-to-end encryption if it’s ordered to comply with the proposed British legislation protecting Online Safety. 

2023-03-17

TikTok Is Banned From British Government Phones

The app is under increasing scrutiny over its security & data privacy, with concerns it could be used to promote fake news and steal customer data.

2023-03-14

Meta Plans A Rival To Twitter 

A decentralized text-based app would allow Meta to take advantage of the current problems with Elon Musk's management of Twitter.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Center for a New American Security (CNAS)

Center for a New American Security (CNAS)

CNAS is the nation's leading research institution focused on defense and national security policy. Cyber security issues are an intrinsic element of the national security debate.

Hedgehog Security

Hedgehog Security

The key objective of Hedgehog is to provide simple, effective and affordable information security improvements that support your drive to increase productivity and profitability.

Sungard Availability Services (Sungard AS)

Sungard Availability Services (Sungard AS)

Sungard AS partners with customers around the globe to understand their unique business needs and provide production and recovery services tailored to their requirements.

CyberSAFE Malaysia

CyberSAFE Malaysia

CyberSAFE Malaysia is an initiative to educate and enhance the awareness of the general public on the technological and social issues and risks facing internet users.

Prompt

Prompt

Prompt supports the creation of partnerships and the setting up of industrial-institutional applied R&D projects for all ICT sectors.

JobStreet.com

JobStreet.com

JobStreet is one of Asia’s leading online employment marketplaces in Malaysia, Philippines, Singapore, Indonesia and Vietnam.

Liberty Mutual

Liberty Mutual

Liberty Specialty Markets offers specialty and commercial insurance and reinsurance products, including Cyber, across the USA, Europe, Middle East and other international locations.

Quantinuum

Quantinuum

Quantinuum is the combination of Cambridge Quantum with Honeywell Quantum Solutions, structured to drive the future of quantum computing.

InferSight

InferSight

InferSight can help you design an architecture that takes into account security, performance, availability, functionality, resiliency and future capacity to avoid technological lock in and limitations

Etisalat and (e&)

Etisalat and (e&)

Etisalat Group is one of the world’s leading telecom groups in emerging markets.

CyberCatch

CyberCatch

CyberCatch provides an innovative cybersecurity Software-as-a-Service (SaaS) platform designed for SMBs.

Cloudsec Asia

Cloudsec Asia

Cloudsec Asia is Thailand's top-ranked cybersecurity consultant company. We offers security services to ensure that all your IT assets are reliable, accessible, and secure.

Millennium Corporation

Millennium Corporation

For nearly two decades, Millennium Corporation has been operating on the leading edge of cybersecurity.

Redpoint Cybersecurity

Redpoint Cybersecurity

Redpoint Cybersecurity is a human-led, technology-enabled managed cybersecurity provider specializing in Digital Forensics, Incident Response and proactive cyberattack prevention.

Uptime Institute

Uptime Institute

Uptime Institute is an unbiased advisory organization focused on improving the performance, efficiency, and reliability of business critical infrastructure.

Athena7

Athena7

Athena7 is a dedicated assessment practice committed to helping organizations understand how their infrastructure, backups, and security controls will withstand the latest threat actor tactics.