Internet

Internet | News, how-tos, features, reviews, and videos

hacker / cryptocurrency attack
DDOS attack

A macro shot at the pixel level of a browser displays 'https' and a glowing lock in the address bar.

6 ways HTTP/3 benefits security (and 7 serious concerns)

HTTP/3 brings improved performance and reliability, along with various security and privacy benefits, but there are some noteworthy challenges.

HTTP prefix sympolizing a web address / URL/ domain being manipulated by a hacker.

Why abandoned domain names are so dangerous

Abandoned domain names are low-hanging fruit for attackers, who can use them to access sensitive email or customer data.

one lit hanging bulb among many unlit ones

10 tips for a secure browsing experience

Your browser is one of the easiest ways for malware to penetrate your network. Here are 10 ways to practice safe surfing in Google Chrome, Microsoft Edge and Mozilla Firefox.

tech spotlight collaboration ctw by fotogestoeber gettyimages 1071228974 3x2 2400x1600

Remote working, now and forevermore?

Employees around the world are suddenly working from home full-time. Find out how to make this new reality work for your organization, whether it will last beyond the pandemic, and where it might take us.

youtube thumbnails template
video

5G, IoT, AI/ML and Wi-Fi 6: 2020 networking predictions

IDC analyst and networking expert Brandon Butler joins Ken and Juliet to discuss networking trends, Wi-Fi versus 5G and how artificial intelligence and machine learning can simplify network management. They also discuss how...

rbgjjor imgur 1

Everything you need to know about 10G, the future of broadband technology

10G is the cable industry’s vision for delivering a remarkable 10 gigabits per second to homes in the U.S. and around the globe.

Tor Browser  >  private / anonymous web browsing / binary onion

What is the Tor Browser? And how it can help protect your identity

The Tor Browser is a web broswer that anonymizes your web traffic using the Tor network, making it easy to protect your identity online.

Admission tickets in an digital network / access / admittance / authorization / authentication

What is OAuth? How the open authorization framework works

OAuth is an open-standard authorization protocol or framework that describes how unrelated servers and services can safely allow authenticated access to their assets. It is widely accepted, but be aware of its vulnerabilities.

tf19 034 thumb
video

Huawei ban may be delayed, but can the company survive without the U.S.? | TECH(feed)

First the Trump Administration banned business transactions between Huawei and U.S. companies. But now, the White House’s budget director has called for a two-year delay on the ban. If this ban does go into effect, how hard will...

deepfakes fake news tv head manipulation superimposed brainwashed

How and why deepfake videos work — and what is at risk

Once the bailiwick of Hollywood special effects studios with multi-million-dollar budgets, now anyone can download deepfake software and use machine learning to make believable fake videos. This makes a lot of people nervous.

thumb
video

Apple showcases new streaming service, plus, Facebook's outage | TECH(feed)

Its servers were down for hours, and then news broke that two of Facebook’s top executives are leaving the company. We’ll take a look at that on today’s episode of TECH(feed). We’ll also discuss Apple new video streaming service.

tf19 007 thumb
video

Android security flaw and big telecom news | TECH(feed)

An Android security flaw could leave your phone vulnerable to hackers while viewing images. And yes, we're talking more about Huawei's battle with the U.S. government. All that and more mobile news on today's episode of TECH(feed).

CSO slideshow - Insider Security Breaches - Flag of China, binary code

China owns half of all VPN services

With VPN use on the rise, a surprising study reveals that half of these services are owned by China, not exactly lauded as a protector of personal privacy.

security trust

What is digital trust? How CSOs can help drive business

Chief security officers should play a key role in building trust with customers, and that translates to better customer acquisition, greater customer loyalty, and more revenue.

security internet network encryption privacy padlock

What is SSL, TLS? And how this encryption protocol works

The SSL/TLS protocol encrypts internet traffic of all types, making secure internet communication (and therefore internet commerce) possible. Here are the basics of how it works and what comes next.

no evil

Synagogue shooter and mail bomber both spread hate speech on social media

Synagogue shooter and mail bomber spread hate speech on social media, but big tech didn't react until it after tragedy struck; MIT to let the internet control an actual person on Halloween. What could possibly go wrong?

What it takes to become an information assurance analyst

This in-demand role calls for a rare combination of superior communication skills and security chops. Learn how one information assurance analyst landed his current job, the skills and training that helped him get there, and where his...

Fraud prevention: Improving internal controls

Internal fraud controls aren't fire-and-forget. Smart collaboration and ongoing improvement will help keep fraud in check. Here are the basics.

Load More