TECHNOLOGY > Key Areas > Social Media


« Back to News

2021-02-25

Australia Makes Google & Facebook Pay

Following an ugly confrontation, Google and Facebook are now required to negotiate with news outlets to pay for their content, or face arbitration.

2021-02-23

Friends Reunite As Facebook & Australia Make Up

Facebook will unblock news pages in Australia following a confrontation with the Government in which both seem to have made concessions.

2021-02-18

Facebook Unfriends Australia

Facebook has blocked Australians from reading news content on their platform and now the government is urging them to #DeleteFacebook.

2021-02-16

Myanmar’s Cyber Security Bill

Myanmar’s military coup leaders have produced a draconian cyber security bill that gives the government sweeping powers over the Internet.

2021-02-12

Instagram, TikTok & Twitter Shutdown Stolen Accounts

The big social media companies work together to frustrate the theft and re-sale of high-value usernames on the OGUsers cyber crime market.

2021-02-08

Myanmar’s New Military Rulers Block Facebook

For many of the population social media is their only access to the Internet and Facebook has become a rallying point against the military coup.

2021-02-02

Google Threatens To Leave Australia

Australia is introducing legislation to require Google, Facebook and other social media companies pay for their local news content.

2021-01-26

Google is Offering $3m To Fact-Check Vaccine Fake News

Google's News Initiative offers to pay $3m to fact checking organisations with the aim to reduce fake news & disinformation about Covid-19 vaccines.

2021-01-25

Biden Twitter Account Starts With Zero Followers

Almost as if they are trying to antagonise the new President, Twitter made Joe Biden open his new Presidential account without any followers.

2021-01-21

Social Media Has Been Weaponised

The weaponisation of social media has turned armed conflict, technology and politics into a battle space playing out on our smartphones.

2021-01-18

WhatsApp Updates Its 'Privacy' Rules

WhatsApp has added new features to allow people to communicate with businesses and those businesses could be hosted by Facebook.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

IP Performance

IP Performance

IP Performance Limited is a leading supplier of customised network infrastructure and security solutions.

Jetico

Jetico

Jetico provides pure & simple data protection software for all sensitive information throughout the lifecycle. Solutions include data encryption and secure data erasure.

Verlingue

Verlingue

Verlingue (formerly ICB Group) is a leading corporate insurance broker providing Insurance, Risk Management and related advice to businesses and private clients.

Center for Strategic Cyberspace & International Studies (CSCIS)

Center for Strategic Cyberspace & International Studies (CSCIS)

CSCIS seeks to advance global cyberspace security and prosperity by providing strategic insights for cyberspace and policy solutions to decision makers.

Viavi Solutions

Viavi Solutions

Viavi Solutions is a global leader in both network and service enablement and optical security performance products and solutions.

Core Security

Core Security

Core Security provides threat-aware identity, access, authentication and vulnerability management solutions.

Gospel Technology

Gospel Technology

Gospel presents a totally new way of accessing and controlling data which is enterprise grade scalable, highly resilient, and secure.

YesWeHack

YesWeHack

YesWeHack offers companies an innovative approach to cybersecurity with Bug Bounty (pay-per-vulnerability discovered) to identify and report vulnerabilities in their systems.

Nokia

Nokia

Nokia is a proven leader in fixed, mobile and IoT security offering capabilities that range from systems design to integration and support.

Portshift

Portshift

Portshift leverages the power of Kubernetes and Service-Mesh to deliver a single source of truth for containers and cloud-native applications security.

Velta Technology

Velta Technology

Velta Technology provide digital safety and cybersecurity solutions for the industrial space.

TwoThreeFour

TwoThreeFour

ThreeTwoFour provide tailored cyber security solutions, delivered by highly-skilled, experienced consultants who respond to the real needs of you and your business.

Orro Group

Orro Group

Orro create 'future now' solutions that make it faster, simpler and safer for you to access, store and share information. Wherever, whenever and with whomever you want.

DataSolutions

DataSolutions

DataSolutions is a leading value-added distributor of transformational IT solutions in the UK and Ireland.

Deutsche Gesellschaft für Cybersicherheit (DGC)

Deutsche Gesellschaft für Cybersicherheit (DGC)

As a leading provider of cyber security, DGC supports companies in taking advantage of the opportunities offered by the digital transformation – and in minimizing the associated risks.

Flawnter

Flawnter

Flawnter is a security testing software that finds hidden security and quality flaws in your applications.