Internet

Internet | News, how-tos, features, reviews, and videos

spring cleaning vacuum carpet
browsers

santa claus

How to track Santa Claus on Christmas Eve: NORAD Santa Tracker, Google Santa Tracker

You can track Santa's annual Christmas Eve journey on your PC, mobile device, or even social networks and search engines.

vpn hub 960
Updated

Best VPN services of 2018: Reviews and buying advice

Surfing the web through a virtual private network (VPN) can keep your identity and data safe and secure online. We show you what to look for in a VPN and help you pick the best one for your needs.

vulnerable cryptojacking hacking breach security

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.

Mozilla Firefox headquarters

What's in the latest Firefox update? Mozilla looks over users' shoulders, suggests tools and add-ons

The newest update to Firefox, version 64, includes a built-in recommendation system that points to specific browser add-ons users might want based on how they're surfing.

microsoft edge browser resized2
Updated

Microsoft Edge embraces open-source Chromium code, plans move to Windows 7, 8, and Macs

Microsoft's Edge is embracing the open-source Chromium project and expanding to other operating systems. It'll even run Chrome extensions, company executives said recently.

pcw chrome primary

What's in the latest Chrome update?

Chrome 71 for Windows, macOS and Linux goes after sites that deliver what the search giant calls "abusive experiences," and includes patches for 43 security flaws.

security trust

What is digital trust? How CSOs can help drive business

Chief security officers should play a key role in building trust with customers, and that translates to better customer acquisition, greater customer loyalty, and more revenue.

security internet network encryption privacy padlock

What is SSL, TLS? And why it’s time to upgrade to TLS 1.3

The TLS protocol encrypts internet traffic of all types, making secure internet communication (and therefore internet commerce) possible. Here are the basics of how it works and what comes next.

iot global growth wireless internet industrial iot smart home connect mobile devices

Cisco predicts nearly 5 zettabytes of IP traffic per year by 2022

Cisco's annual look at the state of the internet finds that IoT, tons of new internet users, video surveillance, and IP WAN traffic drive traffic growth.

google maps chicago

Google Maps is the new social network

While Twitter tumbles and Facebook flounders, Google Maps has emerged as the best social network for businesses.

bing black friday experience

Microsoft Bing's Black Friday research tools are hit-and-miss

Microsoft's Bing search engine adds phone-versus-phone research tools and comparison shopping, but its deals archive doesn't quite live up to what it promises, yet.

deepfakes fake news tv head manipulation superimposed brainwashed

What are deepfakes? How and why they work

Once the bailiwick of Hollywood special effects studios with multi-million-dollar budgets, now anyone can download deepfake software and use machine learning to make believable fake videos. This makes a lot of people nervous.

google abusive ad

Google's Chrome 71 will block 'abusive' ads that trick you into clicking them

Google says its upcoming Chrome 71 browser will take down all ads from sites that allow deceptive advertising.

free wi-fi

How 'free' Wi-Fi hotspots can track your location even when you aren't connected

Some free Wi-Fi hotspots are tracking the locations of users who've signed on even if they're no longer connected. PCWorld investigates how this happens.

arrows laptop upward outward vectors

Why Microsoft and Google love progressive web apps

Microsoft wants everything to run on Windows. Google wants everything to run on the web. (And what does Apple want?)

ipsecurity protocols network security vpn3

ICANN’s internet DNS security upgrade apparently goes off without a glitch

The KSK rollover involved generating a new cryptographic public and private key pair and distributing the new public component to parties who operate validating resolvers, according to ICANN. Such resolvers run software that converts...

hand holding paper cloud for google cloud logo

SQL injection explained: How these attacks work and how to prevent them

There are several types of SQL injection, but they all involve an attacker inserting arbitrary SQL into a web application database query. The good news? SQLi is the lowest of the low-hanging fruit for both attackers and defenders.

ipv6 new IP

What is IPv6, and why aren’t we there yet?

IPv6 has been in the works since 1998 to address the shortfall of IP addresses available under Ipv4, yet despite its efficiency and security advantages, adoption is still slow.

Load More