Internet

Internet | News, how-tos, features, reviews, and videos

spinning globe smart city iot skyscrapers city scape internet digital transformation

As the internet turns 50, experts weigh future advances and emerging issues

The next 50 years may bring pervasive connectivity, brain-computer interfaces and walled-off areas of the internet.

product 29657 product shots4

Get a lifetime of Babbel language learning for $149 (50% off)

Now you can learn a new language — on your own terms — with the Babbel language learning app.

IPv6 wireless network protocol

How to prevent IPv6 VPN breakout

Without properly configured remote-access VPNs, IPv6 traffic from remote devices can escape corporate security controls.

Tor Browser  >  private / anonymous web browsing / binary onion

What is the Tor Browser? And how it can help protect your identity

The Tor Browser is a web broswer that anonymizes your web traffic using the Tor network, making it easy to protect your identity online.

Admission tickets in an digital network / access / admittance / authorization / authentication

What is OAuth? How the open authorization framework works

OAuth is an open-standard authorization protocol or framework that describes how unrelated servers and services can safely allow authenticated access to their assets. It is widely accepted, but be aware of its vulnerabilities.

NW_internet 50th anniversary2

Evolution of the internet: Celebrating 50 years since Arpanet

50 years after the birth of the internet's precursor, Arpanet, there are more internet-connected devices than people in the world, and traffic is measured in exabytes.

global network puzzle pieces

How I learned to stop worrying and love the splinternet

The web was never going to be worldwide. The idea of one single global internet is an obsolete fantasy.

RIP - grave - tombstone - cemetery - death [Image by Rob van der Meijden - CC0 via Pixabay]

Oracle does-in Dyn, resets DNS services to cloud

Oracle wants its DNS customers to migrate from its Dyn service to Oracle Cloud services, but some of those customers are very unhappy.

chromium logo blue

Google's Chromium browser explained

Chrome is the most popular browser in the world, but there would be no Chrome without Chromium, the open source project that underpins it. Here's what Chromium is, where you can download it and how it shapes your online experience....

deepfakes fake news tv head manipulation superimposed brainwashed

How and why deepfake videos work — and what is at risk

Once the bailiwick of Hollywood special effects studios with multi-million-dollar budgets, now anyone can download deepfake software and use machine learning to make believable fake videos. This makes a lot of people nervous.

code, security

How Link Digital left web development behind to drive data growth

Making its mark as a Canberra-based web development company in 2001, Link Digital began moving towards open data services about five years ago, based on CKAN, Drupal and Amazon Web Services (AWS).

Guy Fawkes mask held aloft above the landscape / Anonymous / hacker / protest

What is Cryptojacking?

'Cryptojacking' is a term used to describe the action of secretly using a computer to mine cryptocurrency.

anonymous / Guy Fawkes Mask / hoodie / hacker / smoke grenades / security / protest / disruption

Malicious URLs now rampant: study

Malicious URLs are now rampant problem according to a study which found they are contained in an average of one in every 61 emails.

intro security vulnerability

Cisco warns a critical patch is needed for a remote access firewall, VPN and router

Cisco is warning organizations with remote users using a particular wireless firewall, VPN and router to patch a critical vulnerability in each that could let attackers break into the network.

domain name system dns security data center lock icann

ICANN urges adopting DNSSEC now

Continuing attacks on directory name services have prompted ICANN to prompt enterprise DNS uses to push their suppliers for DNSSEC services to block some of these attacks that can compromise corporate data.

podcasts stock

Suddenly, podcasting becomes a sound business

Spotify began a buying spree in an apparent bid to dominate podcasting. Here’s what it knows that others don’t.

friends using iphone smartphones mobile facebook app

How fake news is changing the internet

The tools we all use for knowledge, communication and business are being re-engineered to stop disinformation. Is our loss of control worth it?

spring cleaning vacuum carpet

ICANN housecleaning revokes old DNS security key

ICANN will complete the switchover this week to a new internet security key that protects DNS, the internet's address book. The old Root Key Signing Key will be decomissioned Jan. 10.

security trust

What is digital trust? How CSOs can help drive business

Chief security officers should play a key role in building trust with customers, and that translates to better customer acquisition, greater customer loyalty, and more revenue.

security internet network encryption privacy padlock

What is SSL, TLS? And how this encryption protocol works

The SSL/TLS protocol encrypts internet traffic of all types, making secure internet communication (and therefore internet commerce) possible. Here are the basics of how it works and what comes next.

Load More