Internet

Internet | News, how-tos, features, reviews, and videos

Mozilla Firefox headquarters
vpn hub 960

browsers

Top web browsers 2019: Chrome dumps user share

It was a good month for Mozilla's Firefox browser, which is at its highlest level of use in a year, and for the Microsoft IE/Edge combo. The user share for the two browsers jumped 1.4 points.

pcw chrome primary

What's in the latest Chrome update?

Chrome 74 patches 39 security flaws and adds support for websites that want to limit stomach-churning motion effects for users.

chromium logo blue

Google's Chromium browser explained

Chrome is the most popular browser in the world, but there would be no Chrome without Chromium, the open source project that underpins it. Here's what Chromium is, where you can download it and how it shapes your online experience....

deepfakes fake news tv head manipulation superimposed brainwashed

How and why deepfake videos work — and what is at risk

Once the bailiwick of Hollywood special effects studios with multi-million-dollar budgets, now anyone can download deepfake software and use machine learning to make believable fake videos. This makes a lot of people nervous.

thumb
video

Apple showcases new streaming service, plus, Facebook's outage | TECH(feed)

Its servers were down for hours, and then news broke that two of Facebook’s top executives are leaving the company. We’ll take a look at that on today’s episode of TECH(feed). We’ll also discuss Apple new video streaming service.

code, security

How Link Digital left web development behind to drive data growth

Making its mark as a Canberra-based web development company in 2001, Link Digital began moving towards open data services about five years ago, based on CKAN, Drupal and Amazon Web Services (AWS).

Guy Fawkes mask held aloft above the landscape / Anonymous / hacker / protest

What is Cryptojacking?

'Cryptojacking' is a term used to describe the action of secretly using a computer to mine cryptocurrency.

anonymous / Guy Fawkes Mask / hoodie / hacker / smoke grenades / security / protest / disruption

Malicious URLs now rampant: study

Malicious URLs are now rampant problem according to a study which found they are contained in an average of one in every 61 emails.

intro security vulnerability

Cisco warns a critical patch is needed for a remote access firewall, VPN and router

Cisco is warning organizations with remote users using a particular wireless firewall, VPN and router to patch a critical vulnerability in each that could let attackers break into the network.

domain name system dns security data center lock icann

ICANN urges adopting DNSSEC now

Continuing attacks on directory name services have prompted ICANN to prompt enterprise DNS uses to push their suppliers for DNSSEC services to block some of these attacks that can compromise corporate data.

clicks pageviews traffic denial of service ddos attack 100613842 orig

DDoS explained: How distributed denial of service attacks are evolving

A distributed denial of service (DDoS) attack is when attackers attempt to make it impossible for a service to be delivered, typically by drowning a system with requests for data. They have been part of the criminal toolbox for twenty...

podcasts stock

Suddenly, podcasting becomes a sound business

Spotify began a buying spree in an apparent bid to dominate podcasting. Here’s what it knows that others don’t.

friends using iphone smartphones mobile facebook app

How fake news is changing the internet

The tools we all use for knowledge, communication and business are being re-engineered to stop disinformation. Is our loss of control worth it?

spring cleaning vacuum carpet

ICANN housecleaning revokes old DNS security key

ICANN will complete the switchover this week to a new internet security key that protects DNS, the internet's address book. The old Root Key Signing Key will be decomissioned Jan. 10.

vulnerable cryptojacking hacking breach security

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.

security trust

What is digital trust? How CSOs can help drive business

Chief security officers should play a key role in building trust with customers, and that translates to better customer acquisition, greater customer loyalty, and more revenue.

security internet network encryption privacy padlock

What is SSL, TLS? And how this encryption protocol works

The SSL/TLS protocol encrypts internet traffic of all types, making secure internet communication (and therefore internet commerce) possible. Here are the basics of how it works and what comes next.

iot global growth wireless internet industrial iot smart home connect mobile devices

Cisco predicts nearly 5 zettabytes of IP traffic per year by 2022

Cisco's annual look at the state of the internet finds that IoT, tons of new internet users, video surveillance, and IP WAN traffic drive traffic growth.

Load More
Recommended for You