Internet

Internet | News, how-tos, features, reviews, and videos

Tor Browser  >  private / anonymous web browsing / binary onion
Admission tickets in an digital network / access / admittance / authorization / authentication

hacker / cryptocurrency attack

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.

tf19 034 thumb
video

Huawei ban may be delayed, but can the company survive without the U.S.? | TECH(feed)

First the Trump Administration banned business transactions between Huawei and U.S. companies. But now, the White House’s budget director has called for a two-year delay on the ban. If this ban does go into effect, how hard will...

deepfakes fake news tv head manipulation superimposed brainwashed

How and why deepfake videos work — and what is at risk

Once the bailiwick of Hollywood special effects studios with multi-million-dollar budgets, now anyone can download deepfake software and use machine learning to make believable fake videos. This makes a lot of people nervous.

thumb
video

Apple showcases new streaming service, plus, Facebook's outage | TECH(feed)

Its servers were down for hours, and then news broke that two of Facebook’s top executives are leaving the company. We’ll take a look at that on today’s episode of TECH(feed). We’ll also discuss Apple new video streaming service.

clicks pageviews traffic denial of service ddos attack 100613842 orig

DDoS explained: How distributed denial of service attacks are evolving

A distributed denial of service (DDoS) attack is when attackers attempt to make it impossible for a service to be delivered, typically by drowning a system with requests for data. They have been part of the criminal toolbox for twenty...

tf19 007 thumb
video

Android security flaw and big telecom news | TECH(feed)

An Android security flaw could leave your phone vulnerable to hackers while viewing images. And yes, we're talking more about Huawei's battle with the U.S. government. All that and more mobile news on today's episode of TECH(feed).

CSO slideshow - Insider Security Breaches - Flag of China, binary code

China owns half of all VPN services

With VPN use on the rise, a surprising study reveals that half of these services are owned by China, not exactly lauded as a protector of personal privacy.

security trust

What is digital trust? How CSOs can help drive business

Chief security officers should play a key role in building trust with customers, and that translates to better customer acquisition, greater customer loyalty, and more revenue.

security internet network encryption privacy padlock

What is SSL, TLS? And how this encryption protocol works

The SSL/TLS protocol encrypts internet traffic of all types, making secure internet communication (and therefore internet commerce) possible. Here are the basics of how it works and what comes next.

no evil

Synagogue shooter and mail bomber both spread hate speech on social media

Synagogue shooter and mail bomber spread hate speech on social media, but big tech didn't react until it after tragedy struck; MIT to let the internet control an actual person on Halloween. What could possibly go wrong?

hand holding paper cloud for google cloud logo

What is sql injection? How SQLi attacks work and how to prevent them

SQL injection is a type of attack that can give an adversary complete control over your web application database by inserting arbitrary SQL code into a database query.

Chrome browser logos

Google Chrome 70 is coming. Are your security certificates in order?

All Symantec-issued digital certificates will be deprecated on Google Chrome by mid-October. Former Symantec customers must ensure their websites are compliant.

phishing hacker binary keyboard privacy security breach

Facebook security and privacy issues revealed

Last week saw Facebook dealing with security and privacy issues, while the Port of San Diego got hit with a ransomware attack and researchers discovered two Linux kernel bugs.

7 safe browswer search legitimate url domains surfing the internet

Why abandoned domain names are so dangerous

Abandoned domain names are low-hanging fruit for attackers, who can use them to access sensitive email or customer data.

ajit pai fcc

FCC lied about DDoS attack during net neutrality comment process, blames former CIO

FCC Chairman Ajit Pai says a DDoS attack did not take out the net neutrality comment site, and he blames the former FCC CIO for providing incorrect information.

salted hash thumbnail multi final
video

The risks associated with global Internationalized Domain Names | Salted Hash Ep 36

Paul Vixie, CEO of Farsight Security, explains how global Internationalized Domain Names, or global IDNs, sparked the emergence of confusingly similar website addresses with nefarious goals -- and how to combat them.

Election 2016 teaser - Electronic voting security for digital election data

Online voting is impossible to secure. So why are some governments using it?

If you thought electronic voting machines were insecure, wait 'til you meet online voting. Dr. Vanessa Teague has twice demonstrated massive security flaws in online voting systems. Instead of fixes and support, she got official...

vulnerable gdpr breach security cyber attack

GDPR compliance in a nutshell

Time to figure out how to manage your enterprise's compliance with the General Data Protection Regulation (GDPR).

Load More
You Might Also Like