A drawing of a man wearing a hat with red eyes.

I've Been Hacked

Certified Network & Cyber Security Engineers

It looks like a plain pink background with a gradient.

I've Been Hacked | Cyber Security Specialists Gold Coast | 24/7

1300 714 359

Russia’s state communications regulator on Monday has accused Twitter of maliciously violating Russian law by failing to draw down thousands of tweets containing banned info.

Based on Roskomnadzor, Twitter hasn’t deleted 2,862 posts out of the over 28,000 requests for removal the agency has sent after 2017. This includes 2,336 posts associated with suicide, 352 posts that contain pornographic pictures of minors as well as 174 posts with info about drug manufacture as well as use, the agency said.

Roskomnadzor’s statement comes after Twitter  blocked  100 accounts associated with Russian government-linked users last month. 

The social network said 69 of the blocked accounts “amplified narratives that were aligned with the Russian government” as well as “undermining faith in the NATO alliance and its stability.” Another 31 accounts were linked to the Internet Research Agency, which the U.S. accuses of carrying out an online campaign aimed at influencing its 2016 presidential election, Twitter said.

In turn, Roskomnadzor had demanded that Twitter provide a list of the blocked accounts as well as evidence of their connection with Russian government agencies. 

In mid-February, Twitter also  blocked  the account of the Russian Arms Control Delegation in Vienna, a move it later reversed.

Under Russian law, social media networks face administrative fines ranging from 800,000 to 8 million rubles for failing to delete banned information. The fine is increased to one-fifth of the company’s total annual revenue for repeat offenses.

Russia has ramped up its rhetoric against foreign social media corporations in recent months as the opposition has been eager to use the increasingly popular platforms to call for anti-government demonstrations

By Cyber Security Consultant January 30, 2024
Cyber Security is become most needed services for all business and industries in 2024. Every business is concerned about Cyber Security. Security operations (SecOps) leaders face a multifaceted challenge: detecting elusive and novel threats using outdated tools, mitigating the risks posed by unexplored dark data, and managing the resource-intensive nature of staying ahead of evolving […]
A drawing of a man wearing a hat and a mask
By Myles Larden December 11, 2023
This is a subtitle for your new post
A person is holding a credit card in their hand.
By Myles Larden November 21, 2023
Credit Card Skimming on the Rise
By Cyber Security Consultant January 26, 2023
ABOUT CERTIFIED LEAD IMPLEMENTER TRAINING AND EXAMINATION FOR INFORMATION SECURITY MANAGEMENT SYSTEM ISO / IEC 27001 Learn and get certified as a professional in implementation of ISO 27001 standard through our self-paced E-learning interactive course which comprises of 4 modules. Upon completion of these modules, you can appear for an examination and get certified as […]
A thief is fishing for emails on two laptops with a fishing rod.
By ThioJo May 5, 2022
Ive been hacked explaining how to spot a fake email
A person is holding a cell phone with a camera attached to it.
By Whos the boss May 5, 2022
A man is standing in front of a sign that says new scams 2022.
By ThioJo May 5, 2022
A bunch of visa cards are laying on top of a 100 dollar bill
By Wired.com May 5, 2022
ABOUT 500 ECOMMERCE websites were recently found to be compromised by hackers who installed a credit card skimmer that surreptitiously stole sensitive data when visitors attempted to make a purchase.
A silhouette of two people looking at a tinder app on a cell phone.
By Guardian Australia May 5, 2022
Victims ‘financially and emotionally devastated’ by scammers who prey upon vulnerable, often older, people, bureau finds
A man wearing a mask is using a laptop computer
By Myles Larden May 5, 2022
Members of the hacker gang may act in Russia’s interest, but their links to the FSB and Cozy Bear hackers appear ad hoc
More Posts
Share by: