Internet

Internet news, trends, analysis and practical advice

code programming software bugs cybersecurity
wal mart 129860898258472376 100624006 primary.idge

trending storylines

LinkedIn's Trending Storylines aims to broaden users' news horizons

LinkedIn wants to be its users’ professional news feed, and the company just launched a new feature aimed at providing them with a broad set of perspectives on relevant business news.

woman on tablet with broken lock

Password-stealing flaws in LastPass Chrome and Firefox extensions

Critical vulnerabilities in the Chrome extension and Firefox add-on for LastPass could be exploited to steal passwords and remotely execute code.

facebook stock headquarters building

How much data can a fiber carry? Facebook and Nokia are pushing it

Facebook and Nokia have found a way to push a lot more data through a submarine cable across the Atlantic, which could help the social network keep up with the growth of video and virtual reality.

Age of Ascent

3D web content could get a lift from DirectX, Apple's Metal and Vulkan

One of the big problems in gaming is incompatibility. A game written for Windows and DirectX won't work on Macs or Android devices. Vulkan games work on Android, but not on Apple devices, which has its own Metal API.

code programming software bugs cybersecurity

Flaws in Moodle CMS put thousands of e-learning websites at risk

Organizations that use the popular Moodle learning management system should deploy the latest patches as soon as possible because they fix vulnerabilities that could allow attackers to take over web servers.

p1200649

Mozilla beats rivals, patches Firefox's Pwn2Own bug

Mozilla has already patched a Firefox vulnerability revealed during Pwn2Own, the first vendor to fix a flaw disclosed at the hacking contest.

girl hands privacy stop

Private photos of more celebrities leaked in Fappening 2.0

Photos and videos of more and more celebrities leak in the latest round The Fappening 2.0.

guetzli

How Google research can make the internet faster

Although websites have to implement Google's new research for the effect to take place.

video

Lose yourself in the Infinity Room, a mixed-media art project at SXSW

This piece by artist Refik Anadol takes it to infinity.

p1200734

Minn. police seek data on who Googled a victim's name

Local police in Minnesota are trying to solve a bank fraud scheme by demanding Google give up data on people who looked up key search terms that may be related to crime.

email encryption

4 simple steps to keep web-based email secure

A few simple steps, including the use of multi-factor or two-step verification, can help keep your web-based email secure from prying eyes.

facebook twitter google plus social media logos

Social media companies have a month to update service terms in the EU

Facebook, Twitter and Google have been given a month to make changes to their user agreements in the European Union or face "enforcement action."

google home beauty

Google pulls virtual assistant ad after users complain

Google Home users got a surprise Thursday when their virtual assistants cheerily mentioned that the live-action remake of “Beauty and the Beast” is opening in theaters this weekend. The ad has since been pulled.

170315 fbi 2

Inside the Russian Yahoo hack: How they did it

One mistaken click. That's all it took for hackers aligned with the Russian state security service to gain access to Yahoo's network and potentially the email messages and private information of as many as 500 million people.

FCC

New FCC chief's call to action could hasten 5G's arrival

FCC Chairman Ajit Pai has pledged his agency will respond more quickly to new technology proposals, a move that might influence the direction of 5G development around the world.

Legislation of privacy security keyboard law legal gavel court ruling

Crime ring turned to Amazon and eBay to sell stolen printer ink

A dozen suspects are accused of raking in at least $12 million by putting stolen ink cartridges and retail electronics up for sale on Amazon and eBay, New York’s attorney general said on Wednesday.

finger on keyboard with email icons floating out of monitor

Defensive Computing for email attachments

Email attachments are the modern Trojan Horse and need to be treated as such.

chromelogo

Chrome makes power move, suppresses background tabs

Google's latest upgrade to the Chrome browser began what will be a series of moves to reduce the browser's power use by limiting activity in background tabs.

Load More