Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

ASUS crafts some of the highest-performing and best-looking wireless routers on the market, but as far as the Federal Trade Commission (FTC) is concerned, it's also crafted some of the most insecure. The FTC alleges that ASUS put... Read more...
In the fall of 2014, Google lost a valuable man: Andy Rubin. While Rubin had his hands in a number of important projects at the big G, none were more important than his creation of Android in 2003. Today, Android is the most widely-used... Read more...
Dell's Alienware Steam Machine is under the microscope today. In partnership with several leading PC makers, Valve has finally taken their often-talked about Steam Machine with custom SteamOS to market, promising the depth and precision of... Read more...
Security outfit AVG is catching some heat for a Chrome browser extension that left millions of users vulnerable to a variety of online attacks. Called "AVG Web TuneUp," it automatically gets installed into Chrome as part of AVG's antivirus... Read more...
2015 has proven to be a massive year for Adobe's Flash plugin, but for all the wrong reasons. Flash is already infamous for being one of the most vulnerable pieces of software on the planet, but in 2015, 316 bugs were found and squashed. That comes out to about 6 bugs per week for a piece of... Read more...
Some Amazon shoppers report having received an email from the online retailer to let them know that their passwords have been reset. Usually that's cause for concern, such as a security breach -- something that's become all too common as... Read more...
Let me start by saying that Siri and I have a solid relationship. If I need directions to a place I've never been before or a reminder set, she dutifully obliges every single time. I like that. But if Siri turns on me and starts sharing my... Read more...
Security firm Lookout has just revealed what could be one of the most hard-hitting pieces of malware to ever hit Android. It doesn't have an official name, except to be referred to as "trojanized adware", and right from the top, we can... Read more...
The security gurus at Trend Micro believe that the cyber attackers behind Pawn Storm are performing their dirty deeds by way of a new zero-day vulnerability in none other than Adobe's Flash platform. Shocking that Flash is at the root of... Read more...
If you go out of your way to protect your privacy with everything you do, you undoubtedly know how complicated it can be while mobile. Most phone makers simply don't put much of an emphasis on user privacy, usually sticking to the bare... Read more...
Updated The lock screen on your phone might not be foolproof as you thought. Researchers at The University of Texas at Austin released a demonstration this week of what they say is a vulnerability in mobile devices running Android 5.x... Read more...
There have been several high profile security breaches over the last couple of years, and in many instances, cyber thieves were able to extract personal information of their target's customers. Usually this resulted in the company offering... Read more...
While the NSA had the support of all US telcos with its spying efforts, it's come to light that none offered the level of assistance that AT&T did. Recent documents that are part of the ongoing Snowden leaks show the NSA heaping a bit of... Read more...
In November, Amazon announced the latest addition to its hardware line-up, the Amazon Echo. The Echo smart speaker doubles as a digital assistant and home entertainment device. It’s an always-connected, always-available Siri or... Read more...
At this point, the resetting of a mobile phone to a from-the-factory state is something we have all done, perhaps simply to get a fresh start with a device that has become sluggish and over-burdened with years of downloaded flotsam. But... Read more...
Another day, another story about a poor SSL implementation. According to analytics service SourceDNA, a staggering 1,500 iOS apps are bugged with a gaping HTTPS hole, allowing attackers to intercept traffic that should otherwise be... Read more...
What value would you put on your personal information, such as your social security number? To me, that kind of information is invaluable, because in the wrong hands, your life can be made a living hell. But according to FCC, that... Read more...
Whenever a software flaw is discovered and is then patched, it's not often that we'll ever hear about it again (the exceptions are those that do big damage). It's even more rare when we end up hearing about a "medium" bug again four years... Read more...
An old software flaw is giving Apple and Google new headaches. Browsers on some Android and iOS devices are susceptible to the “Factoring attack on RSA-EXPORT Keys” exploit known as FREAK. Both companies have developed fixes for the... Read more...
Apple has yet to reveal pricing information for the high-end versions of its Apple Watch products (only the entry-level Sport edition has been priced; it will set you back $349), though like most of the company's products, we'd be... Read more...
At this point, I think it's safe to call the security level of Adobe's Flash player "asinine". Sometimes, it feels like full-blown OSes, such as Windows, have far fewer bugs. When is the last time you remember having to update your OS with... Read more...
Say what you will about the inconvenience of security checks, but this year alone the TSA found thousands of loaded guns, a hand grenade, and an enchilada with an 8-inch knife inside the carry-on baggage of forgetful travelers. Many of the... Read more...
First ... Prev 9 10 11 12 13 Next