
The loss of net neutrality: Say goodbye to a free and open internet
The effort to restore net neutrality advanced after the U.S. Senate voted to reinstate the rules. The motion still has a battle ahead of it. If it fails, you can expect these long-lasting problems to surface.

Net neutrality is net new revenue
Rolling back net neutrality rules will spawn record shareholder returns and telco empires—and destroy the original concept of the internet.

Security certificates gone wrong
Some websites, including one secured by the U.S. Department of Homeland Security, fail in their use of security certificates.

Virtual assistants hear everything, so watch what you say. I’m not kidding
Virtual assistants such as Google Home and Amazon Echo lack security guards, raising questions about safety and privacy.

The IoT of bricks: Someone is bricking insecure IoT devices
BrickerBot takes IoT security into its own hands. It finds vulnerable IoT devices and disables them, creating potentially dangerous situations.

10 practical privacy tips for the post-privacy internet
ISPs and providers can now sell your personal data thanks to the U.S. Congress. Here’s what you can do to maintain your online privacy.

The insecurities list: 10 ways to improve cybersecurity
Cybersecurity threats are more prevalent than ever. But there are some basic things you can do to protect your company and your users.

Pwn2Own 2017: Your stuff as mincemeat
Security teams gathered at Pwn2Own 2017 to hack your favorite software and found plenty of bugs, proving nothing is foolproof.

After the WikiLeaks dump: Do nothing
Don’t panic about WikiLeaks. If someone wants to hack your system, they will find a way. Your best option: Continue your security best practices.

Checklist for choosing a small cloud host or ISP
Use this checklist to select a cloud host or ISP—and prevent future problems.

Mobile World Congress 2017: Mobility monsters
GSMA has brought everything mobile to Mobile World Congress 2017 in Barcelona, painting a picture of mobile world domination.

The $475 S key
Without Apple Care, a broken S key on a MacBook Air turns into an outrageous $475 repair.

Harbinger of The Great Internet Wall arrives
President Trump’s executive order on immigration puts non-U.S. citizens’ data in jeopardy.

The latest database attacks: Tips of the icebergs
MongoDB, ElasticSearch and Hadoop have been hit by ransomware. This is just the beginning of such attacks.

Windows 10 peeping: Microsoft fails to understand the uproar
With each new Windows update malady, Microsoft loses the confidence of users who might otherwise find value in the product.

Rated insecurity: Faux Cat 6 cable sold on Amazon
Some Amazon sellers offer Cat 5 and Cat 6 Ethernet cable for cheap, but it is insecure—isn’t UL- or TIA-approved and is at risk for starting a fire.

On being a 24/7 organization and the 2016 leap second
Providing 24/7 support 365 days a year isn’t a requirement, causing headaches when you need help most. On top of that, the 2016 leap second could complicate things.

Zen and the art of security
Achieving security Zen is a long discipline of unlearning what you’ve learned and accepting countless paradoxes.

Looking to 2017: It’s not just enterprise security
Things are bad for the security of everything and data privacy, and 2017 will be equally bad if not worse.