TECHNOLOGY > Key Areas > Social Media


« Back to News

2021-01-18

Social Media Is Being Used To Turn Truth Upside Down

Despite Donald Trump being canceled on Twitter and Facebook and the Parler platform kicked offline, the flood of fake news keeps on coming.

2021-01-13

Amazon, Apple & Google Cancel Parler

Parler needs to find a new web hosting service after Amazon found posts encouraging violence and both Apple & Google withdrew the App.

2021-01-07

Social Media Platforms Block Donald Trump

Twitter, Facebook and Instagram suspend Donald Trump’s accounts for breaking content regulations by inciting violent demonstrations in Washington.

2021-01-04

Facebook Fingers Vietnamese APT Group

Facebook has taken it upon itself to disrupt the activities of two groups of hackers, one operating from Vietnam and the other from Bangladesh.

2020-12-15

E-Businesses That Don’t Require Employees

Starting a business that doesn't require employees keeps overhead expenses down and intelligent use of Technology makes a really big difference.

2020-12-15

The Personal Data Being Used To Get Your Vote

Everything about you, from your phone number to your salary and home address, is collected and traded by political campaigns and consultants.

2020-12-11

Facebook Could Be Broken Up

The US Federal Trade Commission (FTC) is suing for the disintegration of Facebook and they are asking for the sale of Instagram and WhatsApp.

2020-12-09

We Live In A Transient Internet

The Internet's capacity for privacy has dissolved with the arrival of social media, but some say the loss of anonymity might not be such a bad thing.

2020-12-03

Facebook Fights Fake News - Badly

Despite Facebook's best efforts, its critics say that the social media giant has been completely ineffective in dealing with waves of misinformation.

2020-11-26

Donald Trump Had His Twitter Account Hacked

A Dutch cyber investigator has claimed he gained access to Donald Trump's Twitter account with the password 'MAGA2020!' Police are investigating.

2020-11-26

How The Internet Has Transformed Our Lives

Those born after 1990 may not realise the profound effects of the Internet on almost every aspect of modern life. Both good and bad.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IntaForensics

IntaForensics

IntaForensics offer a full range of digital investigation services and are able to adapt to the individual needs of solicitors, private clients, Law Enforcement Agencies and commercial businesses.

8MAN

8MAN

8MAN is a leading Access Rights Management (ARM) solution in Microsoft and virtual server environments.

Mixed Mode

Mixed Mode

Mixed Mode is a specialist in embedded and software engineering for applications including IoT and secure embedded systems.

AllClear ID

AllClear ID

AllClear ID provides products and services that help protect people and their personal information from threats related to identity theft.

Findings

Findings

Findings (formerly IDRRA) is a scalable AI powered assessment platform that streamlines security compliance across sectors, jurisdictions and regulatory frameworks.

Argo Group

Argo Group

Argo is an international underwriter of specialty insurance. Argo Cyber offers a full spectrum of coverage solutions related to professional and technology services.

Internet Infrastructure Investigation

Internet Infrastructure Investigation

Internet Infrastructure Investigation offers a bespoke Internet Governance Solution to your brands online infringement problems.

Marlabs

Marlabs

Marlabs is a Digital Technology Solutions company that helps companies adopt digital transformation using a comprehensive framework including Digital Automation, Enterprise Analytics and Security.

apiiro

apiiro

apiiro invented the industry-first Code Risk Platform™ that uses developers and code behavior analysis to accelerate delivery and automatically remediate product risk.

Blaick Technologies

Blaick Technologies

Blaick is an Israeli cyber-security company which deploys proprietary Artificial Intelligence threats detection technology for early prevention of online cyber crime.

AirEye

AirEye

AirEye is a leader in Network Airspace Protection (NAP). Block attacks against your corporate network launched from wireless devices in your corporate network airspace.

Riskonnect

Riskonnect

Riskonnect technology empowers organizations with the ability to anticipate, manage, and respond in real-time to strategic, operational, and digital risks across the extended enterprise.

Vaultinum

Vaultinum

Vaultinum are a trusted independent third party specialized in the protection and audit of digital assets.

Resourcive

Resourcive

Resourcive is the first Value Added Sourcing “VAS” consultancy. We deliver strategic IT sourcing solutions to mid-market and enterprise clients.

Skyhigh Security

Skyhigh Security

Skyhigh Security enables your remote workforce while addressing your cloud, web, data, and network security needs.

Beetles Cyber Security

Beetles Cyber Security

Beetles is a crowdsourced penetration testing platform designed to build a trusted, hacker-centric approach to protectan organization’s digital attack surface.