Internet

Ahhh, the good ol' Interweb. Sub-topics include search engines, social media, and WWW.




Hackers attack a computer every 39 seconds, but what's almost as surprising is the number of people who believe that they’ll never be...

The Truth About Cybersecurity


Phishing scams are rapidly evolving both in terms of the tools being used and the cleverness with which they are being designed. But there...

How to Keep from Getting Phished in 2020


2020 will be a new phase of opportunity for IoT. Learn what new trends to look forward to from big picture to everyday living.

IoT in 2020: What's Next?


With any new technology, there are trade-offs, and unfortunately, IoT systems and devices can create threat vectors for cyber attacks.

How IoT Can Compromise Your Home's Safety and Security


Learn how relatively inexpensive it is to add IoT features to a product, and how this has helped to make life easier and more convenient to...

How IoT Can Make Your Home Safer and More Secure


Learn the privacy benefits of Skype and also the privacy concerns related to it.

Understanding Privacy Risks and Benefits of Skype Communication


The U.S. still lags behind the EU with regard to privacy protection. Despite a few federal privacy laws covering particular industry...

Can We Expect a U.S. Federal Consumer Privacy Law?


The EU General Data Protection Regulation (GDPR) entered into force on the 25th of May 2018. Despite the extensive media coverage of the...

5 Common Myths About the GDPR


One in five Americans has a disability that changes the way they interact with technology. It’s important to approach all customers with an...

5 Common Questions About Website Accessibility


Thanks to the advance of IoT, the market for wearables keeps expanding to the point that it should hit 50 billion devices by 2020. These...

Hacking Wearable Tech: The Potential Danger of Advancing Wearable Technology


Web 3.0 is going to be vastly different from what we know Web 2.0 to be. Virtual reality (VR) will play a big role in UX, and hinting at...

5 Ways Virtual Reality will Augment Web 3.0


People love cats, and so, apparently, does AI! Here we take a look at artificial intelligence projects focused on felines (and how they can...

AI and Cats: A Wonderful Love Story in the Digital Age


The jump from Web 1.0 to 2.0 gave us a more easily accessible, interactive web. But what can we look forward to with Web 3.0? Experts share...

Straight From the Tech Experts: What Will the Defining Feature of Web 3.0 Be?


The internet of things (IoT) is growing at a rapid pace, but that means our security measures must grow as well. See what steps you can...

10 Steps to Strengthen Your IoT Security


Despite its small number of commands, SNMP is a powerful - and useful - protocol that has persisted for decades, and is likely to continue...

SNMP: The Little Protocol That Could


The internet, while an indispensable tool, is also the most likely access point for malware. Browser isolation allows internet use while...

The Top 6 Qualities to Look for in a Browser Isolation Solution


Without these programming languages, the internet wouldn't exist. These languages - some dating back to the 1950s - are the foundation for...

The 5 Programming Languages That Built the Internet


Despite good intentions, ethical hackers are are sometimes prosecuted for their discoveries. Do they need broader legal protection?

Do Ethical Hackers Need Legal Protection?


We need more and more information to be productive citizens of the 21st century. The internet is the best way to get it.