Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

We often report on phishing campaigns involving fraudulent customer support agents who trick victims into giving up sensitive information or installing malware on their systems. However, sometimes threat actors flip this script, instead posing as customers in need of help in order to prey on customer support agents... Read more...
Hardware vulnerabilities are never fun, especially when actively exploited in the wild. Forward-looking companies try to get ahead of bad actors by encouraging responsible disclosure and awarding bug bounties. AMD has worked with security researchers who recently found numerous desktop and server/data center... Read more...
AMD's RDNA 3 GPU architecture found in the Radeon RX 7900 family of graphics cards was a tremendous leap in performance over the previous generation found in the Radeon RX 6000 series. Therefore, it only stands to reason that the next generation of AMD's high-performance and adaptive computing accelerators would... Read more...
Back in August of this year, an unknown actor operating under the username “devil” posted information relating to 5.4 million Twitter users for sale on BreachForums. This data included the email addresses and phone numbers tied to users’ accounts. Now, someone with the username “Ryushi” claims to be selling a similar... Read more...
The proliferation of “smart” devices within the home has raised privacy concerns as it has become more apparent that the companies selling these devices often have access to data and media collected by the devices. Eufy, a sub-brand of the popular Chinese electronics manufacturer Anker Innovations, tries to capitalize... Read more...
Between all the scintillating Black Friday deals and the Cyber Monday bargains that will follow, you may end up spending a lot of time surfing online retail stores for discounts. That's all well and good, but if you're among the more than 2 billion people who use Google's Chrome browser, take a moment to apply the... Read more...
AMD has just officially launched its 4th generation of EPYC server CPUs. Codenamed Genoa, these EPYC 9004 series processors are built using the same Zen 4 DNA powering the company’s Ryzen 7000 series of consumer desktop CPUs. The central story behind these processors is the same as ever—larger core... Read more...
We here at HotHardware regularly advise our readers to ensure that their systems and software are up to date. Updates may include cool new features, but most updates are security-driven, patching holes, fixing glitches, and preventing exploits. However, for Apple, apparently not all systems are created equal, for not... Read more...
Mullvad VPN, the Swedish VPN service that powers Mozilla VPN, is currently in the midst of a security audit of its Android app. While conducting this audit, the company discovered that Android’s VPN settings don’t block the operating system from making certain connections to Google servers outside the VPN tunnel... Read more...
Designing mobile CPU cores like those found in Qualcomm’s Snapdragon 8+ Gen 1 is only one aspect of Arm’s business. The company licenses designs for a myriad of enterprise use cases as well, which range from the datacenter to edge devices, and everywhere in between. Today, Arm has announced significant improvements... Read more...
After introducing video end-to-end encryption (E2EE) for a subset of its wired doorbell and camera devices over a year ago, Ring has announced that it is now extending this capability to its wireless devices. While the company doesn’t specify in its announcement which of its battery-powered devices will support E2EE... Read more...
Researchers have detailed the SQUIP attack, which is particularly worrisome for users of AMD Zen 1, Zen 2 and Zen 3 processors. Researchers were able measure the precise degree of Scheduler Queue Usage (i.e., occupancy) via Interference Probing, giving the attack its name. Using this technique, it was possible in... Read more...
AMD has been tearing it up in the desktop market with its Ryzen 5000 series processors since their release, but news on the Threadripper front has been comparatively quiet. Threadripper and Threadripper Pro 3000 series processors launched all the way back in 2020, and up until a few months ago the company hadn’t been talking much about... Read more...
Amazon published a press release this morning announcing that it has entered into a merger agreement with iRobot, the company best known for its Roomba line of robot vacuum cleaners. So long as the deal receives shareholder and regulatory approval, Amazon will acquire iRobot for a $61 per share, totaling approximately... Read more...
Ransomware attacks have been on the rise. This time around, the small Ontario, Canada town of St. Marys has been targeted. The ransomware organization behind the attack seems to be LockBit. So far though, no ransom has been paid. The town itself claims that most city functions are still operational and staff are still... Read more...
Phishing attacks employ various methods to trick users into handing over sensitive information, such as login credentials. Over time, as users have become more suspicious and email clients, web browsers, and IT departments have implemented anti-phishing measures, scammers have had to get creative and devise more... Read more...
Last week, we wrote about spyware that researchers gave the name “Hermit” and attributed to the Italian spyware vendor RCS Labs. Hermit falls within the same class of spyware as NSO Group’s Pegasus spyware, which infected at least nine phones belonging to US State Department employees. This sort of spyware is usually... Read more...
MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) researchers say they have discovered an unpatchable vulnerability affecting Apple's custom Arm-based M1 silicon at the chip's last level of defense. Since it is not possible to patch out the flaw, are owners of M1 devices sitting ducks? Not... Read more...
If you thought AMD would only talk about dollars and cents at its Financial Analyst Day event, think again. Sure, AMD CEO Dr. Lisa Su shared plenty of data on TAM growth opportunities and ongoing investments, but it’s all predicated on a wide-ranging portfolio of compute and graphics products for both consumer and... Read more...
Malware and virus threats are practically commonplace, even a daily occurrence for some users these days. Unfortunately for many users in the Microsoft ecosystem, leveraging popular Office applications is a common security attack vector for many of the ne'er-do-wells of the Internet. In that regard, Microsoft's... Read more...
May 2022 has not been a good month for operating system updates. Microsoft had a problem with Active Directory and later driver crash blue screens of death (BSoD). Now it appears Apple has zero-day security exploit problems affecting many of its major platforms, including macOS, watchOS, and tvOS. An emergency fix... Read more...
Admit it, you use the same password for multiple sites. Even if you don't, a lot of people do because it's just too darn difficult to juggle separate login credentials for a multitude of services and websites that you use or visit on a regular basis. Maybe you employ a password manager to keep track of everything, or... Read more...
1 2 3 4 5 Next