Internet

Internet | News, how-tos, features, reviews, and videos

security trust
ajit pai fcc

deepfakes fake news tv head manipulation superimposed brainwashed

What are deepfakes? How and why they work

Once the bailiwick of Hollywood special effects studios with multi-million-dollar budgets, now anyone can download deepfake software and use machine learning to make believable fake videos. This makes a lot of people nervous.

salted hash thumbnail multi final
video

The risks associated with global Internationalized Domain Names | Salted Hash Ep 36

Paul Vixie, CEO of Farsight Security, explains how global Internationalized Domain Names, or global IDNs, sparked the emergence of confusingly similar website addresses with nefarious goals -- and how to combat them.

thor web browser dark web binary onion

What is the Tor Browser? How it works and how it can help you protect your identity online

The Tor Browser is a web broswer that anonymizes your web traffic using the Tor network, making it easy to protect your identity online.

vulnerable cryptojacking hacking breach security

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.

Election 2016 teaser - Electronic voting security for digital election data

Online voting is impossible to secure. So why are some governments using it?

If you thought electronic voting machines were insecure, wait 'til you meet online voting. Dr. Vanessa Teague has twice demonstrated massive security flaws in online voting systems. Instead of fixes and support, she got official...

vulnerable gdpr breach security cyber attack

GDPR compliance in a nutshell

Time to figure out how to manage your enterprise's compliance with the General Data Protection Regulation (GDPR).

security risk - phishing / malware / social engineering

What is cross-site scripting (XSS)? Low-hanging fruit for both attackers and defenders

With XSS, attackers enter malicious code into a web form or web app URL to trick the application into doing something it's not supposed to do.

internet security privacy

So far, so good for Symantec customers affected by Google distrust issue

DigiCert CEO John Merrill discusses the implications of Google's plan's to distrust Symantec certificates and what his company has done to help with the impending deadlines.

social media multiple logos

Reputational risk and social media: When you're blocked or banned without notice

Businesses depend on sites like Facebook, Twitter, Dropbox, and Apple to interact with customers, promote their messages and store content. One complaint against you can shut you off from those services and damage your brand.

fog visibility island

Security vs. visibility: Why TLS 1.3 has data center admins worried

A number of data center administrators from large financial, health care and retail corporations have begun to regard the current draft of the 1.3 version of the TLS protocol with increasing alarm. The issue comes down the tussle...

clicks pageviews traffic denial of service ddos attack 100613842 orig

DDoS explained: How distributed denial of service attacks are evolving

A distributed denial of service (DDoS) attack is when attackers attempt to make it impossible for a service to be delivered, typically by drowning a system with requests for data. They have been part of the criminal toolbox for twenty...

hand holding paper cloud for google cloud logo

What is SQL injection? This oldie but goodie can make your web applications hurt

SQL injection attacks are well-understood and easily preventable, and the priority for risk mitigation should be preventing SQL injection attacks in the first place. Listen to Little Bobby Tables and sanitize your database inputs.

net neutrality

Will the end of net neutrality be a security nightmare?

Effects of the net neutrality repeal are hard to predict, but there could be additional costs for using endpoint security tools if data rates rise. Best advice: Stay the course on security for now.

security internet network encryption privacy padlock

What is SSL/TLS? (And why it’s time to upgrade to TLS 1.3)

The TLS protocol encrypts internet traffic of all types, making secure internet communication (and therefore internet commerce) possible. Here are the basics of how it works and what comes next.

program dirty 2018.01.09 11.09.30.00 00 30 43.still001
video

Mingis on Tech: How networking will evolve in 2018

From Cisco's plans for intent-based networking to SD-WAN, IoT and 5G pilot programs, the networking industry is growing and changing by leaps and bounds. Here's what's likely to be top of mind in the industry this year.

laptop office network server keyboard

Stolen identities and a lack of verification render public comment procedures meaningless

The Federal Communication Commission’s call for comments on its repeal of net neutrality rules received over 22 million comments but millions of these comments were fake.

bitcoin security vault

Popular streaming sites secretly mine cryptocurrency while you watch free movies

AdGuard discovered crypto-jacking schemes at Openload, Streamango, Rapidvideo and OnlineVideoConverter, affecting nearly 1 billion users per month.

hacked computer security symbol   hacked rot

Researchers' tool uncovers website breaches

UCSD researchers' Tripwire tool uncovered website breaches, yet none of the sites disclosed the breaches to customers after they were told of the hack.

Load More