Internet

Internet news, analysis, research, how-to, opinion, and video.

chromium logo blue

Google's Chromium browser explained

Chrome is the most popular browser in the world, but there would be no Chrome without Chromium, the open source project that underpins it. Here's what Chromium is, where you can download it and how it shapes your online experience....

hand holding paper cloud for google cloud logo

What is SQL injection? This oldie but goodie can make your web applications hurt

SQL injection attacks are well-understood and easily preventable, and the priority for risk mitigation should be preventing SQL injection attacks in the first place. Listen to Little Bobby Tables and sanitize your database inputs.

slide 14 chrome logo

How ad-blocking works in Google’s Chrome browser

Google on Feb. 15 turned on the browser ad-blocking feature it's been talking about for a year. Here's how it works and why Google acted.

00 predictions title

Predictions about Google’s predictive internet

Google’s new core competency is guessing what you’ll do, then doing it (so you don’t have to!).

ipv6 new IP

What is IPv6, and why aren’t we there yet?

For the most part the dire warnings about running out of internet addresses have ceased because, slowly but surely, migration from the world of Internet Protocol Version 4 (IPv4) to IPv6 has begun, and software is in place to...

slide 14 chrome logo

Chrome 68 to condemn all unencrypted sites by summer

Google in July will start inserting a 'not secure' label in the address bar of every website that uses HTTP connections between its servers and users.

Computerworld - Mingis on Tech - video podcast teaser [3x2/1800x1200]
video

Mingis on Tech: What's coming up at Mobile World Congress?

This year's MWC gets under way Feb. 26 in Barcelona, and while hardware announcements are a given, attendees are more likely to be hearing a lot about 5G networking.

browser logos

Think you know web browsers? Take this quiz and prove it.

The browser isn't as glamorous as it used to be, but it's still among the most powerful and reliable tools of the Information Age. On the 25th anniversary of Mosaic – remember that? – take our quiz on the history and technology of...

vulnerable cryptojacking hacking breach security

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.

vpn hub 960
Update

Best VPN services of 2018: Reviews and buying advice

Surfing the web through a virtual private network (VPN) can keep your identity and data safe and secure online. We show you what to look for in a VPN and help you pick the best one for your needs.

0 video conferencing

8 lesser-known videoconferencing options for work

If some of your workers are too far away to join you in your huddle room, here are eight options to help them feel they're really there.

net neutrality

Will the end of net neutrality be a security nightmare?

Effects of the net neutrality repeal are hard to predict, but there could be additional costs for using endpoint security tools if data rates rise. Best advice: Stay the course on security for now.

Max Schrems at irish dpc

Facebook must face privacy lawsuit in Austria, EU court rules

Facebook must defend its privacy policy against a consumer lawsuit in an Austrian court, the European Union’s highest court has ruled. Its judgement has consequences for all businesses handling the personal information of consumers in...

alexa01

15 Alexa skills for business success

Amazon’s Alexa virtual assistant is now ready to play a role in the enterprise. These skills will help make the AI behind Alexa more business-savvy.

mozilla firefox primary

Mozilla mandates that new Firefox features rely on encrypted connections

Future web-facing features in the browser must now meet a standard that requires all browser-to-server-and-back traffic be encrypted.

security internet network encryption privacy padlock

What is SSL/TLS? (And why it’s time to upgrade to TLS 1.3)

The TLS protocol encrypts internet traffic of all types, making secure internet communication (and therefore internet commerce) possible. Here are the basics of how it works and what comes next.

facial recognition - biometric security identification - binary face

How blockchain makes self-sovereign identities possible

Who are you? And who decides you’re really you and can be trusted? The answer, and the systems involved, differ in the real world and online. But blockchain technology could make establishing identity and trust much easier for...

Computerworld - Mingis on Tech - video podcast teaser [3x2/1800x1200]

Mingis on Tech: How networking will evolve in 2018

From Cisco's big plans for intent-based networking to SD-WAN, 5G and IoT, the networking industry is in the midst of big changes. Network World's Brandon Butler explains what's happening, and why.

Computerworld - In Memoriam 2017 [cover]

Tech luminaries we lost in 2017

Whether they developed programming languages, carbon nanotubes, data classification systems, video games, or the Internet itself, these 12 men and women are among the tech luminaries we lost in 2017. Their legacies, however, live on.

Google

Chrome to block ads in February

Sites will have to pay an ad coalition to evade a blockade by the world's most popular browser.

Load More