Internet

Internet news, analysis, research, how-to, opinion, and video.

vulnerable cryptojacking hacking breach security
Election 2016 teaser - Electronic voting security for digital election data

vulnerable gdpr breach security cyber attack

GDPR compliance in a nutshell

Time to figure out how to manage your enterprise's compliance with the General Data Protection Regulation (GDPR).

security risk - phishing / malware / social engineering

What is cross-site scripting (XSS)? Low-hanging fruit for both attackers and defenders

With XSS, attackers enter malicious code into a web form or web app URL to trick the application into doing something it's not supposed to do.

internet security privacy

So far, so good for Symantec customers affected by Google distrust issue

DigiCert CEO John Merrill discusses the implications of Google's plan's to distrust Symantec certificates and what his company has done to help with the impending deadlines.

social media multiple logos

Reputational risk and social media: When you're blocked or banned without notice

Businesses depend on sites like Facebook, Twitter, Dropbox, and Apple to interact with customers, promote their messages and store content. One complaint against you can shut you off from those services and damage your brand.

fog visibility island

Security vs. visibility: Why TLS 1.3 has data center admins worried

A number of data center administrators from large financial, health care and retail corporations have begun to regard the current draft of the 1.3 version of the TLS protocol with increasing alarm. The issue comes down the tussle...

clicks pageviews traffic denial of service ddos attack 100613842 orig

DDoS explained: How distributed denial of service attacks are evolving

A distributed denial of service (DDoS) attack is when attackers attempt to make it impossible for a service to be delivered, typically by drowning a system with requests for data. They have been part of the criminal toolbox for twenty...

hand holding paper cloud for google cloud logo

What is SQL injection? This oldie but goodie can make your web applications hurt

SQL injection attacks are well-understood and easily preventable, and the priority for risk mitigation should be preventing SQL injection attacks in the first place. Listen to Little Bobby Tables and sanitize your database inputs.

net neutrality

Will the end of net neutrality be a security nightmare?

Effects of the net neutrality repeal are hard to predict, but there could be additional costs for using endpoint security tools if data rates rise. Best advice: Stay the course on security for now.

security internet network encryption privacy padlock

What is SSL/TLS? (And why it’s time to upgrade to TLS 1.3)

The TLS protocol encrypts internet traffic of all types, making secure internet communication (and therefore internet commerce) possible. Here are the basics of how it works and what comes next.

program dirty 2018.01.09 11.09.30.00 00 30 43.still001
video

Mingis on Tech: How networking will evolve in 2018

From Cisco's plans for intent-based networking to SD-WAN, IoT and 5G pilot programs, the networking industry is growing and changing by leaps and bounds. Here's what's likely to be top of mind in the industry this year.

laptop office network server keyboard

Stolen identities and a lack of verification render public comment procedures meaningless

The Federal Communication Commission’s call for comments on its repeal of net neutrality rules received over 22 million comments but millions of these comments were fake.

bitcoin security vault

Popular streaming sites secretly mine cryptocurrency while you watch free movies

AdGuard discovered crypto-jacking schemes at Openload, Streamango, Rapidvideo and OnlineVideoConverter, affecting nearly 1 billion users per month.

hacked computer security symbol   hacked rot

Researchers' tool uncovers website breaches

UCSD researchers' Tripwire tool uncovered website breaches, yet none of the sites disclosed the breaches to customers after they were told of the hack.

pentagon dc

Pentagon contractor spied on social media, left data unsecured in cloud

Researcher discovered three unsecured AWS storage buckets containing at least 1.8 billion scraped social media posts collected as part of military web monitoring program.

location symantec headquarters flags 300dpi

DigiCert’s acquisition of Symantec’s security business is good news for customers

DigiCert’s already capable team gains some of the industry’s best talent and resources in the area of SSL/TLS certificates and related PKI solutions.

Trump Twitter

Twitter employee deleting POTUS account is a lesson for all companies

A trusted insider turned the lights out on Twitter account of President Donald Trump, reminding us all how superuser access can be abused.

Human Torch

Senator wants tech giants to help U.S. retaliate against Russia

Sen. Mitch McConnell said tech giants such as Google and Facebook should help the U.S. government retaliate against Russia for meddling in the 2016 election.

iphone x pre order

Apple iPhone X engineer fired after daughter’s hands-on video went viral

It's like a double cautionary tale about NDAs and losing control of content once you post it online.

Load More