TECHNOLOGY > Key Areas > Social Media


« Back to News

2015-07-13

Terrorists’ Social Media Output Under Scrutiny

UN panel asks social-media companies to respond on how terrorist groups use their networks to spread propaganda.

2015-06-29

4 News Apps that Will Change Everything

These apps combine the eclectic harvesting of the best content from thousands of news sources with the curating power & skills of human editors.

2015-06-08

How to Stalk Someone’s Location on Facebook

A new tool lets you easily track movements of other Facebook users by scooping up location data shared in Facebook Messenger chats.

2015-04-03

Facebook Successfully Tests Laser Drones in UK Skies

Social network prepares to use solar-powered drones to beam Internet access to rural areas.

2015-03-30

Facebook Data Row Reaches Top Euro Court

Max Schrems has long campaigned against Facebook's data practices. Now he has a day in Court.

2015-02-28

How News Cards Are Quietly Transforming The Web

Cards, a technology that collapses online content into digital containers for fast and easy consumption has begun a transformation across the web.

2015-01-29

Macro-based malware is making a comeback

For the past several months, different groups of attackers have distributed malware through Microsoft Office documents that contain malicious macros, reviving a technique that has been out of style for more than a decade.

2015-02-24

Cyber Soldiers: UK Announces Creation Of The 77th Battalion

Cyberspace is a strategic domain for modern warfare, for this reason, the British Government has decided to create a new cyber unit composed of cyber experts, so-called "Facebook Warriors"

2014-10-20

Beware Poodle Bug!

Three Google researchers have uncovered a security bug in widely used web encryption technology that they say could allow hackers to take over accounts for email, banking and other services in what they have dubbed a "Poodle" attack.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MobileIron

MobileIron

MobileIron provides EMM capabilities to IT organizations that need to secure mobile devices, applications and content.

Planit

Planit

Planit is a leader in Quality Assurance and a specialist in software testing and training services.

Cyberwatch

Cyberwatch

Cyberwatch is a Vulnerability Scanner & Fixer software that helps you to detect and fix the vulnerabilities of your Information System,

aeCERT

aeCERT

aeCERT is the national Computer Emergency Response Team for the United Arab Emirates.

Trust in Digital Life (TDL)

Trust in Digital Life (TDL)

TDL is a membership association of leading industry partners and knowledge institutes for improving the quality of trustworthy digital services.

GMV

GMV

GMV is a technological business group offering solutions, services and products in diverse sectors including Intelligent Transportation Systems, Cybersecurity, Telecoms and IT.

Sevonix

Sevonix

Sevonix is a professional services organization specializing in offering best in class technology implementation and information security consulting services.

Touchstone Security

Touchstone Security

Touchstone Security is a company with a passion for technology, a hyper-focus on cybersecurity, and a special affinity for cloud technology.

spriteCloud

spriteCloud

spriteCloud is an independent software testing, test automation and cybersecurity services provider.

ADGS

ADGS

ADGS is a deeptech company focused in the fields of Agent-Based simulations (Emergent Behavior), Cybersecurity and Biometrics, Social Dynamics, Natural Language Processing and Artificial Intelligence.

ISMAC

ISMAC

ISMAC was founded to create a security solution that would work for smaller to medium as well as bigger corporations at an affordable price.

comforte AG

comforte AG

comforte AG is a leading provider of data-centric security technology. Organizations worldwide rely on our tokenization and format-preserving encryption capabilities to secure personal, sensitive data

Framatome

Framatome

Framatome Cybersecurity portfolio is directly inspired by its unique experience in nuclear safety for critical information systems and electrical systems design.

American Technology Services (ATS)

American Technology Services (ATS)

American Technology Services provides unparalleled services in information technology to support small and mid-sized business. From top-level strategy, to managed services and infrastructure support.

Filigran

Filigran

Filigran provides threat intelligence, adversary simulation and crisis response open solutions to thousands of cybersecurity and crisis management teams across the world.

ISO WISH

ISO WISH

Take your Business to the Next Level with ISO Certification in UAE.