With the current web, all the user data concentrated in the hands of a few creates risk that our data will be hacked. It also makes it easier for governments to conduct surveillance and impose censorship. And if any of these centralised entities shuts down, your data and connections are lost. Then there are privacy concerns stemming from the business models of many of the companies, which use the private information we provide freely to target us with ads.
The world's top eight DNS providers now control 59 per cent of name resolution for the biggest Websites - and that puts the Web at risk. Organisations should diversify their pool of nameservers by taking DNS management services from multiple providers.
Data that may look anonymous is not necessarily anonymous. It’s possible to reduce your individual digital breadcrumb trail by paying only in cash and ditching your cellphone.
It has been 20 years since Chris Wysopal (AKA Weld Pond) and his colleagues at the Boston-based L0pht* hacker collective famously testified before the US Senate that the internet was hopelessly insecure.
For most of us, the quality and convenience of what we receive in exchange for our secrets is enough that we willingly surrender. But now an increasing number of people are more closely counting the cost – to the point of trying to reclaim our right to be unknown.
Folks mistakenly believe that by enabling the incognito browsing mode, they are fully shielded from online tracking and malware.
Menlo Security’s third annual State of the Web report has found that 42% of the top 100,000 sites on the web, as ranked by Alexa, either are using software that leaves them vulnerable to attack or have already been compromised in some way.
Just like enterprises and other large organizations set up honeypots and decoys to misdirect hackers' attention, browsers and similar software should lure website operators into tar pits of useless and false personal information.
A system must be designed not to collect certain data, if its basic function can be carried out without that data.
Facebook employees are calling for a crackdown on suspected leakers and questioning whether “spies” have infiltrated the corporation, according to leaked internal posts that suggest the social media giant’s workforce is becoming defensive in the face of critical public scrutiny.
The search giant's largest fear is currently that US legislators will consider bringing across European legislation that enables people to force Google to remove links from its database – the so-called "Right to be Forgotten."
Google and Facebook's "free" model allows them to aggregate largely unpaid-for content – such as your photos and posts – rather than strike a price for it.
The information that the likes of Facebook and Google store about you without you even realising it.
Tim Berners-Lee: ‘What was once a rich selection of blogs and websites has been compressed under the powerful weight of a few dominant platforms.’
Internet of Things users need to become sysadmins, America's Federal Bureau of Investigation says.
International airline Emirates leaks customers' sensitive personal information to third-party marketing partners and network adversaries. Other airlines like KLM and Lufthansa exhibit similarly lackluster data security practices.
Open source dominates the content management system market.
What's claimed to be the first IPv6-based distributed denial-of-service attack has been spotted by internet engineers who warn it is only the beginning of what could become the next wave of online disruption. Anyone running an IPv6 network needs to, therefore, ensure they have the same level of network security and mitigation tools in place as their IPv4 networks – and fast.
You may no longer be able to see the name, email or house address for whoever owns a specific domain name under new rules proposed by DNS overseer ICANN. However, law enforcement, and possibly intellectual property lawyers, will still be able to access the full registration details after they pass through an accreditation system designed by the world's governments.
It’s also important for people to be able to distinguish what the encryption they are using to protect their information does and does not protect against.