Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

It seems as though antivirus software companies don't only want to secure your computers nowadays, but your crypto mining efforts on those PCs as well. Customers of two antivirus software products have the ability to opt-in to crypto mining on their protected PCs. The world of cryptocurrency and NFTs has been... Read more...
You may not be aware of this, faithful HotHardware reader, but ransomware attacks are rarely random. More commonly, it's an operator within a group who targets a specific organization or network looking for a hefty payout. One such group is the organization AvosLocker, who uses a tool by the same name to encrypt... Read more...
If you are an AT&T enterprise customer with some older technology on the edge of your network, your infrastructure may be under attack by a Russian botnet dubbed EwDoor. In late October this year, researchers at 360 Netlab discovered a threat actor attacking Edgewater Networks' devices using the four-year-old... Read more...
It sometimes (maybe oftentimes) feels like Big Tech plays fast and loose with our privacy and security, as if an apology and a mea culpa after the fact makes everything okay. As much as they'd like that to be the case, it doesn't always suffice. Not in the eyes of the United States Federal Trade Commission, anyway... Read more...
Apple is launching a subscription services for small and mid-sized business with up to 500 employees. Appropriately called Apple Business Essentials, the general idea is to make IT chores easier and more streamlined as business grow, by bundling device management tasks into a single subscription that covers the... Read more...
AMD had quite a bit to say about its updated 3rd Gen EPYC processors with 3D V-cache and new Instinct MI200 GPU accelerators, which deliver massive firepower to enable exascale computing in the HPC sector. But those weren't the only nuggets Dr. Lisa Su and the gang dropped during yesterday's event. Towards the end of... Read more...
For chip companies, bigger profit margins can be found in the data center market, and that's often where we see new innovations manifest first before trickling into the consumer space. To wit, we know AMD is prepping a Zen 3 refresh with stacked 3D V-cache. While we patiently wait, AMD today also just introduced 3rd... Read more...
One of the main reasons that the malware epidemic in the Windows XP days was so severe was because almost all those machines were configured with only a single user account that had administrative privileges by default. That meant that any malware running as that user would have free rein to do whatever it wanted on... Read more...
For at least the second time in 2021, hackers have breached Acer's servers, this time plundering more than 60 gigabytes of data. Acer has confirmed that names, addresses, and phone numbers belonging to several million clients have been compromised in the breach, as well as sensitive corporate financial and audit... Read more...
A couple weeks ago, we wrote about a potentially frustrating iOS 15 messaging bug that could permanently delete precious photos saved to your iPhone, in certain circumstances. This was even present on the iOS 15.1 beta 2 build, which made us nervous that a fix might still be a bit off in the distance. Fortunately... Read more...
A security researcher has discovered an Apple AirTags vulnerability that can effectively turn an affordable tracker into a cheap phishing lure. This is made possible through the tracker's "Lost Mode," where the intention is that if a user loses their AirTag, they can mark it as missing. Supposing an honest individual... Read more...
Like many big tech companies including Microsoft and Google, Apple has a bug bounty program that pays big bucks for newly-discovered security vulnerabilities. The fees for confirmed reports of issues range from $25,000 for "limited" unauthorized control of an iCloud account, to a cool million bucks for a zero-click... Read more...
Heads up for anyone running an AMD build, there is a new chipset driver update available, and you're going to want to install it. The update patches a vulnerability that could allow a user with low privileges to access uninitialized physical memory pages that potential contain sensitive information, including... Read more...
On the eve of its big iPhone 13 unveil, Apple was forced to issue a new software update for its iPhone, iPad, and Mac product lines. As a result, iOS 14.8 and iPadOS 14.8 are now available for the iPhone and iPad, respectively, while Apple issued macOS 11.6 for Macs. One of the driving factors behind the release of... Read more...
Embargos lifted on Radeon RX 6600 XT reviews this morning, but that mainstream gaming GPU isn’t the only one AMD is pushing out the door today. The Radeon Pro W6600, which was announced back in early June alongside the more powerful Radeon Pro W6800, is also launching today. As its name implies, the Radeon Pro W6600, like its gaming-class... Read more...
Remember that scene in Office Space where a trio of disgruntled employees take a problematic printer to field and beat it to a pulp? Anyone who has ever dealt with stubborn printer issues has probably felt that way. It doesn't help that we also have to worry about printer vulnerabilities messing up our day, and to... Read more...
Audacity sparked quite the firestorm over the weekend after the scope of changes to its privacy policy were revealed to the broader public. The changes came after Audacity was acquired by Muse Group earlier this year. Some of the key sticking points that alarmed users of the audio editing program were that while... Read more...
Over the holiday weekend, the popular battle royale game Apex Legends was hacked, but not in the way you may expect. Rather than stealing data, encrypting files, or being generally destructive, the hackers broadcasted a message stating that Respawn Entertainment has not done enough to fight hackers in its first game... Read more...
For the past two decades, Audacity has built and maintained a following as a capable and free audio editing program. Being a no-cost solution is a big draw, and so are a coupe of other attributes—it's an open source program, and available on multiple platforms (Windows, macOS, GNU/Linux). Some users are starting to... Read more...
Last week, hundreds if not thousands of My Book Live customers awoke to their devices being wiped and, in some cases, unrecoverable. At that time, it was simply thought that Western Digital had not patched a critical vulnerability from 2018 that allowed attackers to do this, but it seems there is more to the story... Read more...
Sometimes you may not know that you have been infected with malware until it is too late, as is likely the case for users across more than three million Windows-based computers globally. In a stunning revelation, in the two years between 2018 and 2020, a Trojan-like malware managed to infiltrate millions of Windows... Read more...
After a Reddit user alerted AMD to vulnerabilities within its web store that was making it easy for bots to buy hard-to-get graphics cards and other hardware before us regular folk ever stood a chance, it made some back-end changes and sent the user a t-shirt as a 'thank you' gift. All is now well in the world, right?... Read more...
First ... Prev 2 3 4 5 6 Next