Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

The security gurus at Trend Micro believe that the cyber attackers behind Pawn Storm are performing their dirty deeds by way of a new zero-day vulnerability in none other than Adobe's Flash platform. Shocking that Flash is at the root of it all, isn't it? This is where we all feign surprise, sarcastically of... Read more...
If you go out of your way to protect your privacy with everything you do, you undoubtedly know how complicated it can be while mobile. Most phone makers simply don't put much of an emphasis on user privacy, usually sticking to the bare minimum, or in other words, what's generally expected. Some others, however, go the... Read more...
Updated The lock screen on your phone might not be foolproof as you thought. Researchers at The University of Texas at Austin released a demonstration this week of what they say is a vulnerability in mobile devices running Android 5.x. Also known as Lollipop, it is the latest version of Android and is run by many... Read more...
There have been several high profile security breaches over the last couple of years, and in many instances, cyber thieves were able to extract personal information of their target's customers. Usually this resulted in the company offering a free year of identity theft protection to those affected, though in the... Read more...
While the NSA had the support of all US telcos with its spying efforts, it's come to light that none offered the level of assistance that AT&T did. Recent documents that are part of the ongoing Snowden leaks show the NSA heaping a bit of praise on its relationship with AT&T, saying it was "highly collaborative" and... Read more...
In November, Amazon announced the latest addition to its hardware line-up, the Amazon Echo. The Echo smart speaker doubles as a digital assistant and home entertainment device. It’s an always-connected, always-available Siri or Cortana-like device designed for your home that can provide answers to common questions... Read more...
At this point, the resetting of a mobile phone to a from-the-factory state is something we have all done, perhaps simply to get a fresh start with a device that has become sluggish and over-burdened with years of downloaded flotsam. But more likely, we do it for the purpose of selling the phone or passing it along to... Read more...
Another day, another story about a poor SSL implementation. According to analytics service SourceDNA, a staggering 1,500 iOS apps are bugged with a gaping HTTPS hole, allowing attackers to intercept traffic that should otherwise be secure. The bug exists in a popular networking library called AFNetworking. If an... Read more...
What value would you put on your personal information, such as your social security number? To me, that kind of information is invaluable, because in the wrong hands, your life can be made a living hell. But according to FCC, that information is worth about $90, based on the fact that it's just fined AT&T $25 million... Read more...
Whenever a software flaw is discovered and is then patched, it's not often that we'll ever hear about it again (the exceptions are those that do big damage). It's even more rare when we end up hearing about a "medium" bug again four years later. Such is the case of a vulnerability affecting Adobe Flash (don't act... Read more...
An old software flaw is giving Apple and Google new headaches. Browsers on some Android and iOS devices are susceptible to the “Factoring attack on RSA-EXPORT Keys” exploit known as FREAK. Both companies have developed fixes for the problem, but those fixes haven’t reached users yet.  The issue stems from an old... Read more...
Apple has yet to reveal pricing information for the high-end versions of its Apple Watch products (only the entry-level Sport edition has been priced; it will set you back $349), though like most of the company's products, we'd be surprised if these wrist wearables didn't carry premium price tags. That will... Read more...
At this point, I think it's safe to call the security level of Adobe's Flash player "asinine". Sometimes, it feels like full-blown OSes, such as Windows, have far fewer bugs. When is the last time you remember having to update your OS with an emergency patch? Now how about Adobe Flash? Exactly. Well, since Adobe... Read more...
Say what you will about the inconvenience of security checks, but this year alone the TSA found thousands of loaded guns, a hand grenade, and an enchilada with an 8-inch knife inside the carry-on baggage of forgetful travelers. Many of the people who lost knives to these checks simply forget them, or didn’t consider... Read more...
Hackers have posted a list containing 1,800 usernames, passwords, and email addresses belonging to Minecraft players. While that represents a small fraction of the overall number of Minecraft players, those who appear on the list are at risk of having their accounts broke into by anyone who views the list, which has... Read more...
Dell's SecureWorks Counter Threat Unit (CTU) has just discovered a new piece of malware that it dubs "Skeleton Key". Besides being one of the coolest-named pieces of malware ever, Skeleton Key provides access to any user account on an Active Directory controller without regard to supplying the correct password. As... Read more...
When a computer vulnerability is revealed by both the Department of Homeland Security and Carnegie Mellon University Software Engineering Institute, I'd say there's a pretty good chance that it shouldn't be ignored. Apparently, Apple agrees. Today, the Cupertino firm released its first-ever forced update, taking... Read more...
If you have Flash Player installed, and chances are pretty overwhelming that you do, you'll want to make sure that you're equipped with the latest and greatest version. Last month, Adobe issued a Flash update that blocked certain exploit kits from being able to take advantage of a user's PC, but as it turns out, that... Read more...
A recently discovered vulnerability in iOS set off panic alarms due to the nasty nature of it. Security researchers warned that malicious apps installed using enterprise/ad-hoc provisioning would be able to replace legitimate apps on a user's iOS device. Dubbed "Masque Attack," it prompted a warning from the U.S... Read more...
Are you sure that app on your iPhone is legitimate? If you've been careful not to fall for phishing scams, then chances are you're right. However, there's a new malware targeting iOS that's capable of spoofing and even overwriting legitimate apps you've downloaded from Apple's App Store, such as Gmail, for example... Read more...
Adding to the pile of awesome already heaped onto Amazon Prime memberships, the e-tailer this week introduced Prime Photos, which is yet another tantalizing benefit for Prime subscribers. In this case, Prime Photos provides free unlimited photo storage in Amazon Cloud Drive, so the only restrictions you have to worry... Read more...
Apple recently posted a security bulletin alerting iCloud users to the presence of "intermittent organized network attacks using insecure certificates to obtain user information," and though the company didn't publicly point a finger at China, several reports suggested that's where they're coming from. In response to... Read more...
First ... Prev 9 10 11 12 13 Next