TECHNOLOGY > Key Areas > Social Media


« Back to News

2022-03-30

Australia Sues Facebook Over Scam Advertising

Facebook & Australia Have History: Now the governnment has accused the social media platform of misconduct in running fake crypto adverts.

2022-03-19

Georgia Must Bolster Resilience To Information Warfare

The invasion of Ukraine has important lessons for the ex- soviet republic of Georgia, which now urgently needs to tackle Russian disinformation.

2022-03-21

In Britain 'Cyberflashing’ Is Now A Crime

Sending unsolicited sexual images via social media, dating apps, as well as data sharing tools like Bluetooth and Airdrop, will get two years in jail.

2022-03-21

The App At The Frontline Of Information Warfare

Telegram enables Russian citizens to access first-hand information, news & video from war scenes in Ukraine, that run counter to Russian propaganda.

2022-03-21

Facebook Allows Calls for Violence Against Russian Leaders

Extreme: Facebook and Instagram will allow users to call for violence against Vladimir Putin and Russian soldiers over Ukraine’s invasion.

2022-03-21

Ukraine's 'IT Army' Risks Being Hijacked By Malware

A malware campaign is exploiting people's willingness to support Ukraine against Russian invasion to infect them with malicious Trojans.

2022-03-15

The Limits Of Social Media Soft Power

Social media platforms can - and in the case of Ukraine - have turned social media into soft power. But it has its limits. By Ronald Marks

2022-03-10

Twitter Joins Ukraine’s War Effort

Twitter has been a powerful weapon in many conflicts, used to spread propaganda & fake news. Now, it has picked a side and will defend Ukraine.

2022-03-08

Russia Threatens To Block Wikipedia

Don't Mention Ukraine: The national media regulator, Roskomnadzor, says that if editors don't comply, it will block all of Wikipedia from Russia

2022-03-08

Phishers Are Moving In On LinkedIn

Criminals are using LinkedIn to steal your data. If you get sent a link to LinkedIn.com via email, SMS/text or instant message, don't click on it.

2022-03-07

Mark Zuckerberg's Vision: How AI Will Unlock The Metaverse

The metaverse, a futuristic idea of virtual environments where users can work, socialise and play, will ultimately replace the mobile Internet.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DriveLock

DriveLock

Our security solution is designed to prevent external attacks, which are evermore sophisticated as well as monitor, document and even prevent internal incidents.

Exatel

Exatel

Exatel is Poland’s leading provider of ICT security services.

Baffin Bay Networks

Baffin Bay Networks

Baffin Bay Networks operates globally distributed Threat Protection Centers™, offering DDoS protection, Web Application Protection and Threat Inspection.

DeepCyber

DeepCyber

DeepCyber supports its customers, with an “intelligence-driven” approach, to improve their proactive detection and response "capability" of cyber threats.

Dellfer

Dellfer

Dellfer secures connected cars and other IOT devices through Intrinsic protection, enabling the most sophisticated cybersecurity attacks to be seen instantly and remediated with precision.

Identifi Global Recruitment

Identifi Global Recruitment

Identifi Global is one of the UK's leading Cyber Security & IT Recruitment specialists.

RIT Global Cybersecurity Institute

RIT Global Cybersecurity Institute

At RIT's Global Cybersecurity Institute, we educate and train cybersecurity professionals; develop new cybersecurity and AI-based knowledge for industry, academia, and government.

Nexum

Nexum

Nexum takes a comprehensive approach to security, from detecting and preventing network threats, to equipping you with the information, tools and training you need to effectively manage IT risk.

Transmit Security

Transmit Security

The Transmit Security Platform provides a solution for managing identity across applications while maintaining security and usability.

Antares NetlogiX

Antares NetlogiX

Antares Netlogix are a leading Austrian service provider for IT security, critical infrastructures and managed security services.

The ATOM Group

The ATOM Group

ATOM builds and secures technology for regulated industries. We design and build for a future we can all trust.

OneLayer

OneLayer

OneLayer provide enterprise grade security dedicated for private LTE/5G networks. We ensure that the best IoT security toolkit is implemented in your cellular environment.

Secfix

Secfix

Secfix helps companies get secure and compliant in weeks instead of months. We are on a mission to automate security and compliance for small and medium-sized businesses.

ProjectDiscovery

ProjectDiscovery

ProjectDiscovery is an open-source, cybersecurity company that builds a range of software for security engineers and developers.

Digital.ai

Digital.ai

Digital.ai empowers organizations to scale software development teams, continuously deliver software with greater quality and security.

Treacle Technologies

Treacle Technologies

Treacle Technologies are a Cyber Security startup with a focus on Defensive Security.