TECHNOLOGY > Key Areas > Social Media


« Back to News

2022-09-01

Understanding Fake News

Prebunking: Google has carried out research with valuable findings about how social media can actively pre-empt the spread of disinformation.

2022-08-29

Twitter Concealed Known Security Flaws

Whistleblower: Twitter has major security problems that pose a threat to its users, to its company shareholders, to US national security & democracy.

2022-08-26

EU Still Blocking Social Media Users' Data Transfer

Meta is still threatening to shut down Facebook and Instagram in Europe if it can’t continue to transfer and store user data in the US.

2022-08-15

British Parliament Shuts Down Its TikTok Account

Parliament has closed its TikTok account only a few days after MPs raised concerns about the risk of data being passed to the Chinese government.

2022-08-02

For Sale: 5.4m Twitter Users’ Data

Devil In The Detail: The information for sale allegedly comprises phone numbers & email addresses, including celebrities and numerous companies.

2022-07-21

Companies Going To War On Social Media

Social media is increasingly being used by businesses to spread misinformation, or downright lies, to discredit their commercial rivals.

2022-07-12

Elon Musk Isn't Buying Twitter

Musk says he wants to back out of the $44B deal because Twitter has failed to provide enough information about fake & spam accounts. 

2022-07-06

Google Improves Password Manager Platform Security

Google Password Manager users now have the same experience on Chrome, Android and iPhone and can manage their passwords using iOS.

2022-06-27

Murder Enabled By Social Media

Instagram & Snapchat: British schoolchildren lured a 13-year-old to a park where he was stabbed to death were motivated by images on social media.

2022-06-14

Elon Musk, YouTube & Bitcoin

Crypto Fraud: YouTube is being criticised for failing to tackle a network of cyber criminals streaming fake Elon Musk videos to steal from viewers.

2022-06-21

Social Media Platforms Must Protect Women Online

The British regulator says women are heavier users of social media platforms than men and is urging technology firms to keep women safer online.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

International School of IT Security (ISITS)

International School of IT Security (ISITS)

The International School of IT Security (ISITS) is a leading provider of professional training in the field of IT Security.

Indeed

Indeed

Indeed is a worldwide employment-related search engine for job listings covering job types in all industries, including cybersecurity.

IT Security Jobs

IT Security Jobs

IT Security Jobs is a dedicated portal for everything related to IT professionals looking for IT Security jobs.

Blueskytec (BST)

Blueskytec (BST)

BST provide accredited, patent-pending commercial cyber security hardware and software to protect your cyber physical systems from attack.

Simply Hired

Simply Hired

Simply Hired is a job search engine that collects job listings from all over the web, including company career pages, job boards and niche job websites.

YesWeHack

YesWeHack

YesWeHack offers companies an innovative approach to cybersecurity with Bug Bounty (pay-per-vulnerability discovered) to identify and report vulnerabilities in their systems.

Raqmiyat

Raqmiyat

Raqmiyat provides end-to-end IT Services and business solutions including consultancy, digital transformation, infrastructure and cybersecurity.

comforte AG

comforte AG

comforte AG is a leading provider of data-centric security technology. Organizations worldwide rely on our tokenization and format-preserving encryption capabilities to secure personal, sensitive data

In-Q-Tel (IQT)

In-Q-Tel (IQT)

IQT is the non-profit strategic investor that accelerates the development and delivery of cutting-edge technologies to U.S. government agencies that keep our nation safe.

Clarabot Nano

Clarabot Nano

Nano is the secure file sharing tool to improve content search, data access and collaboration between multiple parties.

WiebeTech

WiebeTech

WiebeTech’s line of digital forensics tools provide innovative and rugged devices for efficient disk imaging and evidence capture.

Drumz

Drumz

Drumz plc is an investment company whose investing policy is to invest principally but not exclusively in the technology sector within Europe.

Brennan IT

Brennan IT

For over 25 years, Brennan’s expert team has helped businesses achieve real success through innovative and secure technology solutions.

Maltego Technologies

Maltego Technologies

Maltego is a comprehensive tool for graphical link analyses that offers real-time data mining and information gathering. Applications include cybersecurity threat intelligence and incident response.

NoviFlow

NoviFlow

NoviFlow is a leading provider of terabit networking software solutions for Communication Service Providers (CSPs).