TECHNOLOGY > Key Areas > Social Media


« Back to News

2022-08-02

For Sale: 5.4m Twitter Users’ Data

Devil In The Detail: The information for sale allegedly comprises phone numbers & email addresses, including celebrities and numerous companies.

2022-07-21

Companies Going To War On Social Media

Social media is increasingly being used by businesses to spread misinformation, or downright lies, to discredit their commercial rivals.

2022-07-12

Elon Musk Isn't Buying Twitter

Musk says he wants to back out of the $44B deal because Twitter has failed to provide enough information about fake & spam accounts. 

2022-07-06

Google Improves Password Manager Platform Security

Google Password Manager users now have the same experience on Chrome, Android and iPhone and can manage their passwords using iOS.

2022-06-27

Murder Enabled By Social Media

Instagram & Snapchat: British schoolchildren lured a 13-year-old to a park where he was stabbed to death were motivated by images on social media.

2022-06-14

Elon Musk, YouTube & Bitcoin

Crypto Fraud: YouTube is being criticised for failing to tackle a network of cyber criminals streaming fake Elon Musk videos to steal from viewers.

2022-06-21

Social Media Platforms Must Protect Women Online

The British regulator says women are heavier users of social media platforms than men and is urging technology firms to keep women safer online.

2022-06-07

US Supreme Court Blocks Texas Law On Social Media ‘Censorship’

Social Media campaigners claimed that Texas would have turned Facebook, Twitter & YouTube into "havens of the vilest expression imaginable".

2022-05-31

Twitter Fined $150m For Selling User Data

While Twitter had undertaken not to give personal information about users to advertisers, the social media company broke its promise. 

2022-05-17

Elon Musk's Deal To Buy Twitter Comes To A Standstill

Twitter is having problems calculating just how many fake accounts are on their platform and it could be Elon Musk wants to renegotiate the terms.

2022-05-13

Wanted: Access To Social Media Data

Despite its enormous influence and large scale manipulation by malicious actors, Social Media remains opaque and resistant to detailed analysis.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

WEBINAR: How To Build And Implement An Effective Endpoint Detection And Response Strategy

WEBINAR: How To Build And Implement An Effective Endpoint Detection And Response Strategy

Join this webinar to learn how the cloud threat landscape is evolving and organizations are deploying more advanced and capable security controls at scale.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

KPMG

KPMG

KPMG s a leading provider of professional services including information technology and cyber security consulting.

CROW - University of Waikato

CROW - University of Waikato

CROW is the first cyber security lab established in a New Zealand educational institution at the University of Waikato.

National Cyber Directorate Israel

National Cyber Directorate Israel

The Israeli National Cyber Directorate provides incident handling services for civilian entities and critical infrastructures and works to increase national resilience against cyber threats.

Spirion

Spirion

Spirion offers data discovery, classification, and protection tools for your business's privacy, security, and compliance program to avoid gaps and risks.

AFCERT

AFCERT

AFCERT is the national Computer Emergency Response Team for Afghanistan.

Apomatix

Apomatix

Apomatix is a platform that simplifies the complexity of cyber risk audit and management.

Arsenal Recon

Arsenal Recon

Arsenal Recon are digital forensics experts, providing consultancy services and powerful software tools to improve the analysis of electronic evidence.

Fugue

Fugue

Fugue ensures cloud infrastructure stays in continuous compliance with enterprise security policies.

Cynexlink

Cynexlink

Cynexlink offers Managed IT Services with Security, Network, Storage & Cloud solutions for all size of business.

EBRAND Services

EBRAND Services

EBRAND, the European experts for brand protection on the Internet. We offer a full set of services including cybermonitoring, fighting counterfeiting offences and online security.

C5 Capital

C5 Capital

C5 Capital is a specialist investment firm that exclusively invests in the secure data ecosystem including cybersecurity, cloud infrastructure, data analytics and space.

Inspira Enterprise

Inspira Enterprise

Inspira Enterprise is a leading digital transformation company with expertise in Cyber Security, Internet of Things (IOT), Blockchain, Big Data & Analytics, Intelligent Automation and Cloud Computing.

Salt Cybersecurity

Salt Cybersecurity

Salt Cybersecurity offer a four-pronged approach to information security that includes Custom Security Policy, Vulnerability Assessment, Threat Detection, and Security Awareness Training.

1898 & Co

1898 & Co

1898 & Co., part of Burns & McDonnell, is a business, technology and security solutions consultancy where experience and foresight come together to unlock lasting advancements.

GoodAccess

GoodAccess

GoodAccess is the cybersecurity platform that gives your business the security benefits of zero trust without the complexities so your users can securely access digital resources anytime, anywhere.

Hook Security

Hook Security

Setting a new standard in security awareness. Hook Security is a people-first company that uses psychological security training to help companies create security-aware culture.