Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Amazon is currently training a bunch of psychics, who will then license their talents to businesses across the US to read people's palms to determine their future, specifically to see if they pose a security threat. Just kidding! There will be no psychic readings, but the retail giant is rolling out Amazon One, which... Read more...
While COVID-19 can claim some credit for more workers than ever performing their job duties remotely over the course of this year, the fact is the corporate world has been moving in that direction for a long time. At the same time, more businesses are trusting their data with private datacenters or public cloud... Read more...
Malware known as Joker is no laughing matter, especially if you have downloaded an infected app that could bring its payload. The Zscaler ThreatLabZ research team recently discovered seventeen Android apps with Joker malware. These particular apps were stealing device information, contacts lists, and SMS messages and... Read more...
There is a very good reason why the Department of Homeland Security recently issued an emergency directive to federal agencies to patch their Windows Servers against Zerologon. Just five days after the directive, Microsoft confirmed on Twitter that Zerologon is actively being exploited by hackers. "Microsoft is... Read more...
It is fair to say that the CPU market has been highly influenced by tech giants such as AMD, Intel, and others over the last few decades. Could one up and coming company help to shake up this market? NUVIA recently raised $240 million USD in their second round of funding. The company is actively working on creating... Read more...
When it comes to troublesome data breaches, this one is pretty significant, and it comes from a surprising company. The company in question is Microsoft, which left one of its backend servers that runs the Bing mobile app wide open. As a result, over 6.5TB of log files were leaked into the internet that contained a... Read more...
Earlier in the week, we reported on a dangerous exploit with Windows domain controllers called Zerologon. Now, the Cybersecurity and Infrastructure Security Agency (CISA), under the Department of Homeland Security direction, is issuing warnings about the exploit and is pushing government agencies to patch the... Read more...
If any of you out there are running the Firefox browser app for Android, please update immediately. Versions below Firefox version 79 on mobile are vulnerable to exploitation of Android intent URIs. This attack uses SSDP payloads to trigger actions without user interaction. According to exploit researcher Chris... Read more...
Typically, ransomware attacks that are seemingly on the increase around the globe are the cause of financial loss and lack of productivity. However, a ransomware attack on a hospital in Germany has reportedly led to the first known death indirectly attributed to such attacks. German authorities are currently... Read more...
Google’s Account Protection Program is their strongest level of account security for those who are at higher risk for attack. Now, Google Chrome is expanding protections for the Advanced Protection users by improving download scanning options. According to Google, Advanced Protection members have been guarded from... Read more...
Last year, Qualcomm announced their Cloud AI 100 platform to provide low-power high-performance AI inference acceleration. Now, these devices are coming to fruition in a variety of form factors for the data center and the individual user. AI inferencing is an important step in developing AI and utilizing it... Read more...
These days just about everybody takes Bluetooth for granted. Manufacturers phase out useful physical ports like headset jacks in high end devices with the expectation that buyers will use Bluetooth headphones. Our cars, watches, locator tags, home theaters, and even game controllers rely on the ubiquitous short-range... Read more...
Imagine this—you're having a good day, your PC is running smoothly, and you decide to install a custom Windows 10 theme, but then all of a sudden things go wrong. Very wrong. As in, you find out your Microsoft account has been compromised, but how can that be? Well, it might have been that custom Windows theme you... Read more...
They say with great power comes great responsibility, and you would think Windows Defender would be incredibly responsible -- at least when it comes to security. As it turns out, however, that Windows Defender shared its “great power” in allowing its command line utility to download potentially malicious files to a... Read more...
Private threat analysis and mitigation company, HYAS, is buying user data from phone apps to try to track hackers. A major side-effect of this, though, is that regular users are possibly being ensnared and HYAS claims they can track people to their “doorstep.” The collection of user data has long been a problem for... Read more...
There is a cumulative update available for Windows 10 that is packed to the rafters with bug fixes and various improvements, and most people are probably unaware it exists. That's because it is currently only available as an optional update, in preview form. These same fixes should be included in the upcoming Patch... Read more...
In 2013, Edward Snowden released information on the U.S. Government regarding the mass surveillance and aggregation of data in America. Now, a U.S. Appellate Court has deemed the mass surveillance unconstitutional and thus illegal. As Reuters reported, “the U.S. Court of Appeals for the Ninth Circuit said the... Read more...
Traditionally, Macs weren't often a target for malware campaigns given their relatively small share of the overall computing market. This notion has changed over the years, however, but Apple has fought back with increased security procedures like an app approval process called notarization. Unfortunately, malware has... Read more...
The FBI and the Cybersecurity and Infrastructure Security Agency (CISA) have issued a warning about a growing threat from criminals seeking to take advantage of people working from home and using a VPN or virtual private network. Apparently there's a growing threat from voice call phishing or "vishing" attacks... Read more...
Microsoft released a security update for Windows 8.1 and Windows Server 2012 R2 that aims to patch two significant security vulnerabilities. These security vulnerabilities are known as CVE-2020-1530 and CVE-2020-1537, and both have to do with elevation of privileges in the operating systems. Both security issues can... Read more...
For some inexplicable reason, it took Microsoft two years to finally patch a security flaw that it both knew about the whole time and was being actively exploited in the wild. That's the bad and/or curious news. The good news? It has finally been patched, with the recent cumulative Patch Tuesday update that arrived on... Read more...
The debate over whether smartphone owners should be legally compelled to involuntary unlock their handsets for law enforcement rages on, and advocates that they should just scored a key victory in New Jersey. In a 4-3 vote, the New Jersey Supreme Court ruled that a former police office accused of tipping off a gang... Read more...
First ... Prev 34 35 36 37 38 Next