TECHNOLOGY > Key Areas > Social Media


« Back to News

2022-04-21

Algorithms, Lies & Social Media

Achieving a more transparent and less manipulative online media may well be the defining political battle of the 21st century.

2022-04-06

The Metaverse Will Have An Impact On Privacy & Security

As augmented reality platforms develop into the Metaverse, users are going to be presented with entirely new categories of security risk.

2022-04-08

The British Online Harms Bill Takes Shape

There will be new rules for social media and the regulator Ofcom will have powers to fine firms or block access to sites that fail to comply.

2022-04-05

Zelensky Deepfake Tells Ukrainians To ‘lay down arms’

Don't Be Fooled: The deepfake purports to show President Zelensky declaring that Ukraine has “decided to return Donbas” to Russia.

2022-03-30

Australia Sues Facebook Over Scam Advertising

Facebook & Australia Have History: Now the governnment has accused the social media platform of misconduct in running fake crypto adverts.

2022-03-19

Georgia Must Bolster Resilience To Information Warfare

The invasion of Ukraine has important lessons for the ex- soviet republic of Georgia, which now urgently needs to tackle Russian disinformation.

2022-03-21

In Britain 'Cyberflashing’ Is Now A Crime

Sending unsolicited sexual images via social media, dating apps, as well as data sharing tools like Bluetooth and Airdrop, will get two years in jail.

2022-03-21

The App At The Frontline Of Information Warfare

Telegram enables Russian citizens to access first-hand information, news & video from war scenes in Ukraine, that run counter to Russian propaganda.

2022-03-21

Facebook Allows Calls for Violence Against Russian Leaders

Extreme: Facebook and Instagram will allow users to call for violence against Vladimir Putin and Russian soldiers over Ukraine’s invasion.

2022-03-21

Ukraine's 'IT Army' Risks Being Hijacked By Malware

A malware campaign is exploiting people's willingness to support Ukraine against Russian invasion to infect them with malicious Trojans.

2022-03-15

The Limits Of Social Media Soft Power

Social media platforms can - and in the case of Ukraine - have turned social media into soft power. But it has its limits. By Ronald Marks

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

National Trading Standards eCrime Team (NTSeCT)

National Trading Standards eCrime Team (NTSeCT)

The National Trading Standards eCrime Team tackles online consumer scams, rip-offs and fraud, as well as those committed by text or email.

CanSecWest

CanSecWest

CanSecWest, the world's most advanced conference focusing on applied digital security, is about bringing the industry luminaries together in a relaxed environment which promotes collaboration and soci

BluVector

BluVector

BluVector has reinvented network intrusion detection with machine learning. Stop waiting for breaches to happen, stay ahead of the advanced threats with BluVector.

Moix Security

Moix Security

Moix Security is consulting firm specialising in application and software security. We help organisations design, build, and maintain secure software.

Secura

Secura

The Secura Cyber Security and Intelligence system predicts and prevents security threats by discovering hidden patterns through the meticulous analysis of large amounts of data.

Accertify

Accertify

Accertify is a leading provider of fraud prevention, chargeback management, and payment gateway solutions.

Newralers

Newralers

Newralers is a leader in artificial intelligence and big data analysis offering solutions in areas including the smart detection of insurance fraud.

Logic Supply

Logic Supply

Logic Supply is a global industrial PC company focused on hardware for the IoT edge. We design highly-configurable computers engineered for reliability.

Transpere

Transpere

Transpere provides IT Asset Disposition (ITAD), Data Destruction, Electronic Recycling and Onsite Data Services.

Vaadata

Vaadata

Vaadata are experts in ethical hacking. We secure your web, mobile and IoT platforms.

Cyber Zones

Cyber Zones

Cyber Zones is a leading provider of penetration test services, RED team assessment services, digital forensics and IT security consulting.

MVP Tech

MVP Tech

MVP Tech designs and deploys next generation infrastructures where Security and Technology converge.

Alacrinet

Alacrinet

Alacrinet is an IT and cyber security consultancy. From penetration testing to fully managed MSSP, our team is focused on knowing the latest threats, preventing vulnerabilities, and providing value.

Moviri

Moviri

Moviri combines security technology engineering, intelligence expertise and our data science DNA to help companies manage digital risk end-to-end.

LBMC

LBMC

LBMC is a professional services solutions provider in accounting and finance, human resources, technology, risk and information security, and wealth advisory services.

Toka Group

Toka Group

Toka empowers government agencies with critical and previously out-of-reach digital forensics, force protection and Intelligence capabilities, tackling the fields' most pressing challenges.