Internet

Internet news, analysis, research, how-to, opinion, and video.

vulnerable cryptojacking hacking breach security
net neutrality

security internet network encryption privacy padlock

What is SSL/TLS? (And why it’s time to upgrade to TLS 1.3)

The TLS protocol encrypts internet traffic of all types, making secure internet communication (and therefore internet commerce) possible. Here are the basics of how it works and what comes next.

program dirty 2018.01.09 11.09.30.00 00 30 43.still001
video

Mingis on Tech: How networking will evolve in 2018

From Cisco's plans for intent-based networking to SD-WAN, IoT and 5G pilot programs, the networking industry is growing and changing by leaps and bounds. Here's what's likely to be top of mind in the industry this year.

laptop office network server keyboard

Stolen identities and a lack of verification render public comment procedures meaningless

The Federal Communication Commission’s call for comments on its repeal of net neutrality rules received over 22 million comments but millions of these comments were fake.

bitcoin security vault

Popular streaming sites secretly mine cryptocurrency while you watch free movies

AdGuard discovered crypto-jacking schemes at Openload, Streamango, Rapidvideo and OnlineVideoConverter, affecting nearly 1 billion users per month.

hacked computer security symbol   hacked rot

Researchers' tool uncovers website breaches

UCSD researchers' Tripwire tool uncovered website breaches, yet none of the sites disclosed the breaches to customers after they were told of the hack.

pentagon dc

Pentagon contractor spied on social media, left data unsecured in cloud

Researcher discovered three unsecured AWS storage buckets containing at least 1.8 billion scraped social media posts collected as part of military web monitoring program.

location symantec headquarters flags 300dpi

DigiCert’s acquisition of Symantec’s security business is good news for customers

DigiCert’s already capable team gains some of the industry’s best talent and resources in the area of SSL/TLS certificates and related PKI solutions.

Trump Twitter

Twitter employee deleting POTUS account is a lesson for all companies

A trusted insider turned the lights out on Twitter account of President Donald Trump, reminding us all how superuser access can be abused.

Human Torch

Senator wants tech giants to help U.S. retaliate against Russia

Sen. Mitch McConnell said tech giants such as Google and Facebook should help the U.S. government retaliate against Russia for meddling in the 2016 election.

iphone x pre order

Apple iPhone X engineer fired after daughter’s hands-on video went viral

It's like a double cautionary tale about NDAs and losing control of content once you post it online.

06 vpn

The best mobile VPNs for the enterprise and how to evaluate them

Do cloud-based mobile VPNs work for the enterprise? Many businesses are saying "yes," but you need to choose a moble VPN and how you use it carefully.

clicks pageviews traffic denial of service ddos attack 100613842 orig

Unlimited DDoS protection the new norm after Cloudflare announcement

With Cloudflare ending surge pricing for DDoS protection services, all website owners are protected equally and potential attack damage is limited.

170315 fbi 2

Inside the Russian hack of Yahoo: How they did it

One mistaken click. That's all it took for hackers aligned with the Russian state security service to gain access to Yahoo's network and potentially the email messages and private information of as many as 500 million people.

hack hacker cyber thief theft stolen

Digital hijacking: My identity is gone

Ever wonder why your identity got stolen? Post-Equifax this article highlights a modern security strategy for the credit bureaus.

dns world

DNSSEC key signing key rollover: Are you ready?

ICANN has postponed the deadline for updating name servers with the new root zone key signing key to early 2018 because too many ISPs and network operators are not ready, and that would cause DNSSEC validations to fail.

dos primary

6 DoS attacks that made headlines

As times have changed, so have these venerable attacks.

social media headaches

Think tank wants tech firms to be held responsible for online terrorism

Policy Exchange wants to hold tech companies’, journalists’ and academics’ feet to the fire when it comes to countering online extremism.

futureofpcsecurity

Future cyber security threats and challenges: Are you ready for what's coming?

Among the the alarming trends highlighted in a new study from The Internet Society (ISOC) are the rise of state-sponsored cyber attacks as the internet is becoming increasingly intertwined with national security and the creation of...

Load More
You Might Also Like