Internet

Internet | News, how-tos, features, reviews, and videos

pcw chrome primary
security trust

security internet network encryption privacy padlock

What is SSL, TLS? And why it’s time to upgrade to TLS 1.3

The TLS protocol encrypts internet traffic of all types, making secure internet communication (and therefore internet commerce) possible. Here are the basics of how it works and what comes next.

browsers

Top web browsers 2018: IE and Edge catch a break – and their breath

For the first time since June, Microsoft's two browsers managed to hold onto their share of the browser market; the same could not be said of Firefox.

vpn hub 960
Updated

Best VPN services of 2018: Reviews and buying advice

Surfing the web through a virtual private network (VPN) can keep your identity and data safe and secure online. We show you what to look for in a VPN and help you pick the best one for your needs.

iot global growth wireless internet industrial iot smart home connect mobile devices

Cisco predicts nearly 5 zettabytes of IP traffic per year by 2022

Cisco's annual look at the state of the internet finds that IoT, tons of new internet users, video surveillance, and IP WAN traffic drive traffic growth.

google maps chicago

Google Maps is the new social network

While Twitter tumbles and Facebook flounders, Google Maps has emerged as the best social network for businesses.

deepfakes fake news tv head manipulation superimposed brainwashed

What are deepfakes? How and why they work

Once the bailiwick of Hollywood special effects studios with multi-million-dollar budgets, now anyone can download deepfake software and use machine learning to make believable fake videos. This makes a lot of people nervous.

Mozilla Firefox headquarters

What's in the latest Firefox update? More anti-tracking and money-making (for Mozilla) searches

Firefox 63 for Windows, macOS and Linux boosts the browser's 'Enhanced Tracking Protection' to help block tracking cookies.

arrows laptop upward outward vectors

Why Microsoft and Google love progressive web apps

Microsoft wants everything to run on Windows. Google wants everything to run on the web. (And what does Apple want?)

ipsecurity protocols network security vpn3

ICANN’s internet DNS security upgrade apparently goes off without a glitch

The KSK rollover involved generating a new cryptographic public and private key pair and distributing the new public component to parties who operate validating resolvers, according to ICANN. Such resolvers run software that converts...

hand holding paper cloud for google cloud logo

SQL injection explained: How these attacks work and how to prevent them

There are several types of SQL injection, but they all involve an attacker inserting arbitrary SQL into a web application database query. The good news? SQLi is the lowest of the low-hanging fruit for both attackers and defenders.

ipv6 new IP

What is IPv6, and why aren’t we there yet?

IPv6 has been in the works since 1998 to address the shortfall of IP addresses available under Ipv4, yet despite its efficiency and security advantages, adoption is still slow.

1 network internet connected grid earth power satellite view

ICANN sets plan to reinforce internet DNS security

ICANN has voted to go ahead with the first-ever changing of the cryptographic key that helps protect the internet’s address book – the Domain Name System (DNS).

comment troll thinkstock

Social media and trolls: The end is near

A new service uses NFC and blockchain to end trolling forever. (And just in time.)

google search2

What is a search engine, anyway?

If you think a search engine exists as an index to the internet, it’s time to update your thinking.

1 network internet connected grid earth power satellite view

Can the internet crash? How the unthinkable could happen

If the dark day comes when the internet does experience a global crash, the thing that takes it down will be, almost by definition, the thing we didn't see coming.

vulnerable cryptojacking hacking breach security

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.

7 safe browswer search legitimate url domains surfing the internet

Why abandoned domain names are so dangerous

Abandoned domain names are low-hanging fruit for attackers, who can use them to access sensitive email or customer data.

mozilla firefox primary

Mozilla sets termination date for Firefox's legacy add-ons

The company will stop supporting Firefox ESR 52, the final release that is compatible with legacy add-ons, in two weeks.

Load More