Web  News  Images  Videos  Shopping  Social

This search engine is designed to provide results for searches concerning the internet industry, including internet issues and internet technologies. If your search is more general in nature, please use 4search.com.


News

Obama orders review of election hacks as Trump doubts Russia’s role
President Barack Obama has ordered U.S. intelligence agencies to conduct a full review of the cyberattacks that allegedly tried to disrupt this year’s election, as his successor Donald Trump casts doubt over Russia’s possible involvement. Obama’s homeland security advisor Lisa Monaco first mentioned the need for the review while speaking to reporters on Friday morning, according to Politico.[ An InfoWorld exclusive: Go inside a security operations center. | Discover how to secure your systems with InfoWorld's Security Report newsletter. ]“We may be crossed into a new threshold, and it is incumbent upon us to take stock of that, to review, to conduct some after-action, to understand what this means, and to impart those lessons learned,” Monaco reportedly said.To read this article in full or to leave a comment, please click here ... read more
Published on 12-09-2016
20 mins ago
US flight regulators consider whether to allow or bar in-flight Wi-Fi calls
wifistory.jpg(credit: Travis Olbrich) The Internet-connected world could get even more connected as federal aviation officials are considering rules on whether fliers should, or shouldn't, make Wi-Fi-based calls. The US Department of Transportation announced Thursday it was seeking public comment on the topic. It is asking the public to ponder whether a rule should demand that airlines, if they offer potential phone service, should provide advance notice to fliers (perhaps at the time of ticket purchase). Regulators also want public input on whether in-flight Wi-Fi calling should be banned outright. "Consumers deserve to have clear and accurate information about whether an airline permits voice calls before they purchase a ticket and board the aircraft," US Secretary of Transportation Anthony Foxx said in a statement. "Today's proposal will ensure that air travelers are not unwillingly exposed to voice calls, as many of them are troubled over the idea of passengers talking on cellphones in flight." Read 10 remaining paragraphs | Comments ... read more
Published on 12-09-2016
28 mins ago
Ransomware attacks against businesses increased threefold in 2016
The number of ransomware attacks targeting companies increased threefold from January to September, affecting one in every five businesses worldwide.According to a new report from security company Kaspersky Lab, the rate of ransomware attacks against businesses increased from one every two minutes to one every 40 seconds during that period. For consumers it was even worse, with the rate reaching one attack every 10 seconds in September.[ An InfoWorld exclusive: Go inside a security operations center. | Discover how to secure your systems with InfoWorld's Security Report newsletter. ]During the third quarter of the year, there were 32,091 new ransomware variations detected by Kaspersky Lab compared to only 2,900 during the first quarter. Overall, 62 new ransomware families appeared this year, the company said.To read this article in full or to leave a comment, please click here ... read more
Published on 12-09-2016
1 hour ago
Dealmaster: Get a Core i5-powered Dell XPS 13 for only $850
Get more great deals and Green Monday Sneak Peeks at TechBargains, as we have a bunch of new deals to share on this Friday. Of note is a great deal on Dell's XPS 13: now you can get the XPS 13 laptop with a Core i5 CPU (Kaby Lake), 8GB of RAM, and 256GB of storage for just $850. That's much less than the notebook's original price of $1,050, so grab it while you can if you're in the need for a new laptop. Check out the full list of deals below. dell-xps-13-640x367.jpeg Featured Read 6 remaining paragraphs | Comments ... read more
Published on 12-09-2016
2 hours ago
IDG Contributor Network: Don’t fear machines, collaborate with them
Occupations accounting for 47 percent of all U.S. employment are at risk of computerization.  And, according to the Oxford economists who conducted the research, this isn’t decades away: it could happen over the next 10 to 20 years. So, are we finally at the point of “The Brain’s Last Stand,” as Newsweek declared after chess master Garry Kasparov lost to an IBM computer 20 years ago?   We don’t have to be. Not if leaders in business and government invest in human-centered automation, a solution that holds the potential to offer the best of both worlds – combining the efficiencies of computerization and the flexibility and creativity of skilled workers.To read this article in full or to leave a comment, please click here ... read more
Published on 12-09-2016
2 hours ago
Attackers use hacked home routers to hit Russia’s 5 largest banks
Botnets made up of hacked home routers were used to launch distributed denial-of-service attacks against the five largest financial organizations in Russia.The attacks occurred on Monday, Dec. 5, and were detected and mitigated by Rostelecom, Russia’s state-owned telecommunications company. The attacks peaked at 3.2 million packets per second (Mpps) and the longest attack lasted for over two hours, Rostelecom reported Friday.[ Watch out for 11 signs you've been hacked -- and learn how to fight back, in InfoWorld's PDF special report. | Discover how to secure your systems with InfoWorld's Security Report newsletter. ]The company did not provide a bandwidth measurement for the attacks, but 3.2Mpps is not that much. DDoS mitigation providers regularly see attacks that exceed 100 Mpps and a very large September attack against the website of cybersecurity blogger Brian Krebs peaked at 665Gbps and 143Mpps.To read this article in full or to leave a comment, please click here ... read more
Published on 12-09-2016
2 hours ago
How Mypy could simplify compiling Python
It’s the dream of every professional Python programmer: Take an existing Python application, run it through a compiler, and generate high-speed, platform-native code that respects Python’s dynamic nature.In theory, that’s possible to do right now—sort of. The problem is, every available path is fraught with limitations. You have to modify the source in non-standard ways (Cython), or use a replacement runtime that’s many times larger than the regular one and has its own limitations (PyPy), or work with tools that are still enormously unstable and experimental (Nuitka).To read this article in full or to leave a comment, please click here ... read more
Published on 12-09-2016
2 hours ago
Fancy Bear ramping up infowar against Germany—and rest of West
Big_brown_bear_ursus_arctos-800x519.jpgEnlarge / The bear is back. It never went away. US intelligence agencies have been forthright in their insistence that the Russian government was behind not only the hacking of the Democratic National Committee (DNC) and other political organizations in the US, but a concerted effort to undermine confidence in the results of the US presidential election, including attacks on state election officials' systems. But the US is not the only country that the Russian government has apparently targeted for these sorts of operations—and the methods used in the DNC hack are being applied increasingly in attempts to influence German politics, Germany's chief of domestic intelligence warned yesterday. In a press release issued on December 8, Germany's Bundesamt für Verfassungsshutz (BfV)—the country's domestic intelligence agency—warned of an ever-mounting wave of disinformation and hacking campaigns by Russia focused on increasing the strength of "extremist groups and parties" in Germany and destabilizing the German government. In addition to propaganda and disinformation campaigns launched through social media, the BfV noted an increased number of "spear phishing attacks against German political parties and parliamentary groups" using the same sort of malware used against the Democratic National Committee in the US. The ... read more
Published on 12-09-2016
2 hours ago
FCC’s Tom Wheeler willing to “step down immediately” to make deal with GOP
wheeler-congress-640x433.pngFCC Chairman Tom Wheeler testifying before the House Communications and Technology Subcommittee in March 2016. (credit: House Energy and Commerce Committee) Federal Communications Commission Chairman Tom Wheeler is willing to leave his post right away if it helps fellow Democrat Jessica Rosenworcel get reconfirmed by the US Senate. Senate Republicans have been saying for months that they won't give Rosenworcel another five-year term on the commission unless Wheeler commits to leaving the commission. Since Donald Trump won the presidential election, the commission's 3-2 Democratic majority will inevitably shift to a Republican majority. But just who will be on the FCC when it's controlled by the GOP is not certain. If Wheeler resigns, the Senate could reconfirm Rosenworcel and still get a 3-2 Republican majority after Trump nominates a new Republican commissioner. Alternatively, Republicans could try to get a majority even sooner by pushing Rosenworcel out and hoping Wheeler leaves anyway. Read 12 remaining paragraphs | Comments ... read more
Published on 12-09-2016
3 hours ago
After cracks, developers remove Denuvo DRM from their games
denuvo-640x400.jpg How valuable is a digital rights management (DRM) piracy protection scheme after it has been cracked? The obvious answer is "not at all," an answer that seems to have been confirmed by the removal of Denuvo protection from two popular games, both of which saw that DRM scheme fail earlier this year. DDOSGaming reports that the 2016 reboot of Doom no longer has Denuvo protection built-in as of an update that went live earlier this week. The move follows a similar pattern to that of Playdead's Inside, which removed Denuvo protection last month. Inside's DRM protection was cracked in August. Playdead, Bethesda, and Denuvo have yet to respond to a request for comment from Ars Technica on the matter, but there is significant speculation and discussion (including from one purported Denuvo-associated developer on Reddit) that Denuvo's contracts include a refund clause if the protection is cracked within a certain time period. Doom was cracked roughly four months after its release, while Inside was available for only six weeks before its protection was broken. Read 2 remaining paragraphs | Comments ... read more
Published on 12-09-2016
3 hours ago
PewDiePie claims he will delete his YouTube channel today
Screen-Shot-2016-12-09-at-10.30.31-AM-800x413.pngEnlarge (credit: YouTube, PewDiePie) News rocking the YouTube world this week comes from the most subscribed creator on the platform. PewDiePie, whose real name is Felix Kjellberg, released a video lamenting some of the issues he has had with YouTube recently, saying he would delete his YouTube channel once he reaches 50 million subscribers. Kjellberg passed that milestone this week and tweeted out yesterday that he will delete his channel today at 5pm GMT, or 12pm EST. Kjellberg's main problem with YouTube, which other top creators including Jacksepticeye and Philip DeFranco have complained about as well, is the apparent change in users' recommended and suggested videos (or how YouTube prioritizes what videos get promoted). He explains in an update video that most YouTubers get half of their views from these two sections. As a viewer, your recommended and suggested videos typically populate with videos from creators you watch regularly, showing you their videos that you may not have watched yet, as well as videos from similar creators. In his video, Kjellberg opens his YouTube analytics to reveal that in October 2016, some of his videos received 60 percent of views by being on suggested lists. However, one month later in November, some of his videos only received 0.07 ... read more
Published on 12-09-2016
3 hours ago
New and improved: Syphilis makes comeback with unexpected drug resistance
Alberta_Department_of_Public_Health_Venereal_Disease_Poster_26534416996-800x585.jpgEnlarge (credit: By Provincial Archives of Alberta [No restrictions], via Wikimedia Commons) For the last few decades, syphilis has been reemerging around the world. This may seem surprising; it can be treated successfully with antibiotics, after all. Yet, amid failures in public health campaigns and the challenge of fighting a disease that can sometimes spread undetected, syphilis is making its comeback. Estimates suggest that there were 10.6 million cases worldwide in 2008. And with its reemergence, it brings a new weapon: drug resistance. For Natasha Arora, a population geneticist, the reemergence was intriguing. Although she started out studying orangutans, the tools of population genetics are multi-purpose, and she took a sideways step into researching syphilis instead. By studying syphilis samples taken from patients around the world, Arora and a team of researchers have found that one of the two modern strains of syphilis is far more widespread than previously thought, and that both current strains show resistance to second-line antibiotics called macrolides. Penicillin is the first choice to treat syphilis, but sometimes macrolides are prescribed instead. “Penicillin needs to be given intramuscularly (for early syphilis) or intravenously (for late syphilis),"says Lola Stamm, who sent syphilis samples to Arora ... read more
Published on 12-09-2016
3 hours ago
Report: Samsung planning to “permanently disable” US Note 7s soon
08514450754406Note-7-terbakar-China1780x390.jpgEnlarge / One of the extra-crispy Galaxy Note 7s after a charging accident. (credit: BusinessKorea ) It's hard to imagine anyone still carrying around a potentially explosive Samsung Galaxy Note 7 after the smartphone was recalled (twice), cancelled, and limited to 60 percent battery capacity. If someone in the US is still holding out against the carriers, Samsung, and common sense after all that, an OTA update will put any active Galaxy Note 7 devices to the sword. That's according to The Verge, at least, which says it received an image of a US Cellular alert sent out to users. “As of December 15th," the message reads, "Samsung will modify the software to prevent the Galaxy Note 7 from charging. The phone will no longer work.” As with other Galaxy Note 7 restrictions, the other US carriers will probably follow suit soon, too. In early November—a month after the second recall started—Samsung said around 85 percent of Galaxy Note 7s had been returned. There are apparently still some diehards out there that just don't want to give up their devices—just check out the Galaxy Note 7 subreddit—and, unless users go to the extreme task of disabling their OTA updates, this should get the last ... read more
Published on 12-09-2016
3 hours ago
Government Transformation Strategy to ‘fundamentally’ change the way departments operate
A background document seen by Computer Weekly outlines details of the forthcoming Government Transformation Strategy ... read more
Published on 12-09-2016
4 hours ago
22% off ASUS Chromebook C202 11.6″ Rugged Water Resistant Design, 180 Degree Hinge – Deal Alert
The highly rated Chromebook C202 from ASUS features a 180-degree hinge, a spill-resistant keyboard, and a reinforced rubber wrapped frame that meets the daily rigors and intense usage that can happen in and outside the home or classroom. The ASUS Chromebook C202 uses a 360 degree WIFI antenna featuring latest generation 802.11a/b/g/n Wi-Fi which provides strong reception to minimize poor signal connection while you are on-the-go. With a built-in HDMI, USB ports, and a SD card reader, ASUS Chromebook C202 makes data transferring and sharing easy and fast. This model features an Intel Celeron N3060 Processor, 4 GB DDR3 RAM, Storage, 16GB Flash Storage, 11.6-inch HD 1366x768 Anti-Glare Display, and up to 10 hours of battery life on a charge. All for the currently discounted price of just $179. See the discounted ASUS Chromebook on Amazon.To read this article in full or to leave a comment, please click here ... read more
Published on 12-09-2016
4 hours ago
1 2 3 47

Information

The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to serve billions of users worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless and optical networking technologies. The Internet carries an extensive range of information resources and services, such as the inter-linked hypertext documents of the World Wide Web (WWW) and the infrastructure to support email. Most traditional communications media including telephone, music, film, and television are being reshaped or redefined by the Internet, giving birth to new services such as Voice over Internet Protocol (VoIP) and Internet Protocol Television (IPTV). Newspaper, book and other print publishing are adapting to Web site technology, or are reshaped into blogging and web feeds. The Internet has enabled and accelerated new forms of human interactions through instant messaging, Internet forums, and social networking. Online shopping has boomed both for major retail outlets and small artisans and traders. Business-to-business and financial services on the Internet affect supply chains across entire industries. The origins of the Internet reach back to research of the 1960s, commissioned by the United States government to build robust, fault-tolerant, and distributed computer networks. The funding of a new U.S. backbone by the National Science Foundation in the 1980s, as well as private funding for other commercial backbones, led to worldwide participation in the development of new networking technologies, and the merger of many networks. The commercialization of what was by the 1990s an international network resulted in its popularization and incorporation into virtually every aspect of modern human life. As of June 2012, more than 2.4 billion people—over a third of the world's human population—have used the services of the Internet. The Internet has no centralized governance in either technological implementation or policies for access and usage; each constituent network sets its own policies. Only the overreaching definitions of the two principal name spaces in the Internet, the Internet Protocol address space and the Domain Name System, are directed by a maintainer organization, the Internet Corporation for Assigned Names and Numbers (ICANN). The technical underpinning and standardization of the core protocols is an activity of the Internet Engineering Task Force (IETF), a non-profit organization of loosely affiliated international participants that anyone may associate with by contributing technical expertise.