TECHNOLOGY > Key Areas > Social Media


« Back to News

2018-12-11

Iran Using Websites To Spread Fake News

More than 70 websites found that push Iranian propaganda to 15 countries as part of a political influence operation.

2018-12-06

Fake Facebook Pages Account For 60% Of Social Network Phishing

Kaspersky's anti-phishing tools prevented 3.7m attempts to visit fraudulent social network pages in Q1. The majority were fake Facebook pages.

2018-11-29

Facebook's Sheryl Sandberg Is 'Tainted' By Crises

As the problems swirling around Facebook gain force, some insiders think that COO Sheryl Sandberg may end being handed the blame.

2018-11-29

Google Challenged Over Location Tracking

Seven consumer groups have filed complaints against Google with national regulators, alleging that user location tracking is in violation of GDPR.

2018-11-28

British Parliament Seizes Facebook Documents

Rarely used parliamentary powers have been used to demand that a US software firm hand over secret data and Facebook say they want it back.

2018-11-27

Google Helps Boost High Street Spending

Google has teamed up with start-up NearSt to help consumers see what is available in their local shops via the web.

2018-11-21

Journalists Aim To Detect Deepfakes

Across the media industry, news organisations can consider multiple approaches to help authenticate news stories if they suspect alterations.

2018-11-19

Delay, Deny and Deflect: How Facebook’s Leaders Fought Through Crisis

A bombshell report on Facebook management’s struggles to deal with data breaches, failures to protect privacy and electoral interference.

2018-11-19

Russian Internet Research Agency Has A New Propaganda Campaign

The Russian troll farm known as the Internet Research Agency has apparently been boasting of its exploits during the US midterm elections.

2018-11-15

Good News About Voting Security

America’s election infrastructure has never been more carefully monitored in the weeks, and months leading up to the nationwide vote.

2018-11-09

How To Avoid Facebook Phishing Scams

Criminals use a variety of methods to target Facebook users, but phishing scams are the most dangerous and potentially damaging.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

USNA Center for Cyber Security Studies

USNA Center for Cyber Security Studies

The mission of the Center for Cyber Security Studies is to enhance the education of midshipmen in all areas of cyber warfare.

Hitachi ID Systems

Hitachi ID Systems

Hitachi ID Systems offers comprehensive identity management and access governance, privileged access management and password management solutions.

Mocana

Mocana

Mocana provides a software platform that allows you to develop, test and distribute more secure IoT devices and services.

Menlo Security

Menlo Security

Menlo Security protects organizations from cyberattacks by eliminating the threat of malware from the web, documents, and email.

Happiest Minds Technologies

Happiest Minds Technologies

Happiest Minds offers domain centric solutions in IT Services, Product Engineering, Infrastructure Management and Security.

CERT Bulgaria (CERT.BG)

CERT Bulgaria (CERT.BG)

CERT Bulfaria is the National Computer Security Incidents Response Team for Bulgaria.

DocAuthority

DocAuthority

DocAuthority automatically discovers and accurately identifies unprotected, sensitive documents, enabling a broad yet business-friendly security policy.

Spanish Network of Excellence on Cybersecurity Research (RENIC)

Spanish Network of Excellence on Cybersecurity Research (RENIC)

RENIC is a membership based sectoral association that includes research centers and other agents of the research cybersecurity ecosystem in Spain.

Idaptive

Idaptive

Idaptive delivers Next-Gen Access through a zero trust approach. Idaptive secures access everywhere with single sign-on, adaptive MFA, EMM and analytics.

Shieldfy

Shieldfy

Shieldfy is a cloud-based security shield for your website to protect it from cyber attacks and malwares.

SCADASUDO

SCADASUDO

SCADASUDO is a cyber solution architecture and design office, established by leading experts in the field of OT (Industrial control) and IT (information Technology).

CloudBolt Software

CloudBolt Software

CloudBolt provide solutions for your toughest cloud challenges. From automation, to cost and security, and hybrid IT governance — we have you covered.

Zyston

Zyston

Zyston's solutions provide end-to-end management of your cybersecurity needs. Our range of services help protect your business where it needs it the most.

KATIM

KATIM

KATIM is a leader in the development of innovative secure communication products and solutions for governments and businesses.

Synagex

Synagex

Synagex Modern IT is a simple IT and cybersecurity solution for businesses.

Cyber Industrial Networks

Cyber Industrial Networks

Cyber Industrial Networks objective is to service the needs of industry in achieving reliable, robust and secure infrastructure that supports productivity.