Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Security researchers at McAfee have discovered new malware targeting Android users, named SpyAgent. The main aim of this malicious software being the theft of seed phrases that can be used to recover cryptocurrency wallets. Although once installed on a device threat actors using SpyAgent will also look to exfiltrate... Read more...
Intel Xeon w7-2595X - MSRP $2,039 The Intel Xeon w7-2595X is a new high-performance 26-Core processor for creators or workstation professionals that require massive memory capacity, bandwidth and horsepower.   Great Multi-Threaded Performance Drops Into Existing Platform Massive Memory Bandwidth Support For... Read more...
Researchers at Cado Security have found new malware targeting maOS users, which is dubbed “Cthulhu Stealer.” The malicious app attempts to deceiver users by masquerading as legitimate software, such as CleanMyMac, Grand Theft Auto IV, and Adobe GenP. It’s incredibly similar to Atomic Stealer, malware first released in... Read more...
Security researchers at Cisco Talos have discovered a set of vulnerabilities affecting macOS users who have Microsoft applications installed on their computers, providing more attack vectors for malicious actors. The researchers say that “an attacker could bypass the operating system’s permission model by using... Read more...
More malware targeting Mac users has been found by searchers at security firm Elastic Security Labs. The malicious software has been dubbed “Banshee Stealer,” and it is able to compromise systems using either Intel or Apple Silicon chips. The researchers says that “this malware presents a severe risk to macOS users... Read more...
In case you haven't been paying attention, artificial intelligence (AI) is a red hot field, which extends into the lucrative data center. Up to this point, NVIDIA has dominated the category with strategic investments in GPU architectures and infrastructure. It's not alone, however, and AMD is making a bold bid to beef... Read more...
An app designed for Verizon in-store demos, identified as Showcase.apk, has left several generations of Pixel smartphones vulnerable to a number of different types of attacks. The app has been around since 2017, and places nearly every Pixel device sold during that time at risk. However, Google remarked it is... Read more...
Yet another leak of stolen data has made its way to Breach Forums, a popular site for bad actors who traffic in this kind of data theft. The data originates from the breach of National Public Data, which is a service that gathers information from separate sources to form profiles on individuals located in several... Read more...
Kioxia will be debuting its latest Solid State Drive prototype at the Future of Memory and Storage conference taking place this week in Santa Clara, California. These broadband SSDs are designed to make use of an optical interface, instead of the legacy copper wire data interfaces currently found on SSDs. The SSDs are... Read more...
IT infrastructure and security systems built in the cloud are great until one of them shuts down your company. Cybersecurity firm CrowdStrike's marketing material says an average cybercriminal can exfiltrate data within 62 minutes of breaking in. However, it only took the company's cybersecurity suite about three... Read more...
Tenstorrent's name might not have quite the same cache that NVIDIA's does when it comes to AI acceleration yet, but the company's unique approach has a lot of benefits. Between a royalty-free RISC-V processor ISA and highly scalable AI accelerator designs, the company promises it can lower the total cost of ownership... Read more...
The artificial intelligence (AI) arms race is reaching a fever pitch, bolstered by AMD signing a definitive agreement to acquire Silo AI, Europe's biggest private AI lab, in an all-cash deal valued at around $665 million. That's not chump change and we could see more big-dollar investments like this as companies look to add to their AI arsenal, Read more...
It appears that AMD is now the latest victim of cybercrime and a data breach, as company data is being offered for sale on a message board frequented by criminal hackers. AMD acknowledged the situation in a statement, noting that, "we are aware of a cybercriminal organization claiming to be in possession of stolen AMD... Read more...
Market research firm Liftr Insights is claiming that it has spotted Amazon Web Services (AWS) running an instance with a staggering 896 cores, surpassing the company’s previous best of 384 cores. This current offering blows away anything else available from other cloud providers, with the closest competitor being... Read more...
Intel Xeon 6 Series Processors Intel is launching the first wave of next-generation Xeon 6 6700E-series processors today, based on Sierra Forest, featuring up to 144 E-cores per socket. Many More Cores Per Socket Power Efficiency Improvements Big Performance Gains Over 5th Gen New, Updated IO Tile Increased Bandwidth... Read more...
AMD disclosed a plethora of details during the Computex 2024 opening keynote regarding upcoming desktop and mobile processors in the Ryzen 9000 and Ryzen AI 300 families, respectively, along with a new dual-slot Radeon Pro W7900WS to facilitate multi-GPU configurations in professional workstations. In addition to... Read more...
It's hard to remember now, but the original AMD Ryzen processors topped out at "just" 8 cores. The Ryzen 3000 family came along in 2019 with the Ryzen 9 branding and the first sixteen-core desktop CPUs. Even in the enterprise market, 16 CPU cores can be overkill. However, you can't just go buying consumer PC hardware... Read more...
Are you looking to get some laundry done on the cheap or, even better yet, free? It turns out a security flaw in a popular internet-connected laundry machine vendor could allow anyone to avoid paying the fee for washing or drying clothes. This vulnerability was reported to the vendor months ago and remains unfixed... Read more...
AirTags and other property tracking tools are remarkably useful for keeping tabs on your stuff wherever it goes. However, on the flip side, hidden trackers are also a concern, with criminals learning to use Apple AirTags to mark vehicles that could be tracked and stolen later. Thankfully, both Apple and Google are... Read more...
It has been a little while since our last major data breach, with the latest being back on April Fools' with AT&T having the information of 73 million accounts appear on the dark web. However, hackers never rest so it was simply a matter of time before another breach would happen, this time with Dell. A threat actor... Read more...
Artificial intelligence has been used for some rather interesting applications, such as helping people deal with losing a loved one. While this is a unique use of the technology, there is so much more that AI can be used to improve our daily lives. This includes cybersecurity, which Google is now capitalizing on by... Read more...
Earlier this month, Microsoft discovered a vulnerability pattern in Android applications that could enable overwriting files and allow remote code execution. This issue that could be leveraged by attackers has also been seen in the wild with several applications, but organizations have seemingly been quick to rectify... Read more...
1 2 3 4 5 Next