Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Audacity sparked quite the firestorm over the weekend after the scope of changes to its privacy policy were revealed to the broader public. The changes came after Audacity was acquired by Muse Group earlier this year. Some of the key... Read more...
Over the holiday weekend, the popular battle royale game Apex Legends was hacked, but not in the way you may expect. Rather than stealing data, encrypting files, or being generally destructive, the hackers broadcasted a message stating... Read more...
For the past two decades, Audacity has built and maintained a following as a capable and free audio editing program. Being a no-cost solution is a big draw, and so are a coupe of other attributes—it's an open source program, and available... Read more...
Last week, hundreds if not thousands of My Book Live customers awoke to their devices being wiped and, in some cases, unrecoverable. At that time, it was simply thought that Western Digital had not patched a critical vulnerability from... Read more...
Sometimes you may not know that you have been infected with malware until it is too late, as is likely the case for users across more than three million Windows-based computers globally. In a stunning revelation, in the two years between... Read more...
After a Reddit user alerted AMD to vulnerabilities within its web store that was making it easy for bots to buy hard-to-get graphics cards and other hardware before us regular folk ever stood a chance, it made some back-end changes and... Read more...
Apple is bringing some color into people's lives with a new line of M1-powered iMac systems, available in green, yellow, orange, pink, purple, blue, and silver. As to what other changes Apple plans on making to its product lines, a hacking... Read more...
As an iPhone user for the past several years, there have been times when I wished there was a way to side-load apps, without resorting to a process known as jailbreaking, which typically involves exploiting a vulnerability to to remove... Read more...
Intel was raked over the coals three years ago when Spectre and Meltdown vulnerabilities were first discovered that could affect its consumer and enterprise processors. The company addressed the side-channel exploits with patches and... Read more...
AMD just launched its next-generation EPYC server processors, codenamed Milan, based on the company’s leading Zen 3 microarchitecture. The new EPYC 7003 series is an important milestone for AMD. The company has made significant in-roads in servers and data centers in recent years, and... Read more...
If there is one thing I learned from cartoons in the 1980s, it is that knowing is the half the battle. Thank you G.I. Joe for that tidbit. Fast forward several decades later and that lesson is playing out right before our very eyes, in... Read more...
Apple is embarking on a two-year plan to transition away from using Intel processors across its laptop and desktop families, in favor of its own Arm-based silicon. The venture begins with the M1, an impressive piece of hardware that is... Read more...
In this episode of Misbehaving Bots, automated Telegram miscreants have been found selling private Facebook user data in an unscrupulous forum, for $20 a pop (or even less). Maybe this is why the bots gobbled up all the latest generation... Read more...
If you give some kids restricted access to technology, they are bound to find a loophole or bug that lets them do what they want regardless. After being asked by his kids to “hack” his Linux desktop, one Dad let the kids play with the... Read more...
We've got 99 problems but Windows 10 ain't one. Just kidding—sometimes Windows 10 is one of those problems. We've had good luck with Windows 10 ourselves, but are aware of various issues people have encountered over the years. One of the... Read more...
Cupertino, we may have a problem. A researcher claims Apple's T2 security chip is vulnerable to an exploit that, if leveraged, would give an attacker full root access and kernel execution privileges. Normally this sort of thing would... Read more...
Amazon is currently training a bunch of psychics, who will then license their talents to businesses across the US to read people's palms to determine their future, specifically to see if they pose a security threat. Just kidding! There... Read more...
Traditionally, Macs weren't often a target for malware campaigns given their relatively small share of the overall computing market. This notion has changed over the years, however, but Apple has fought back with increased security... Read more...
Security researchers recently discovered multiple vulnerabilities within certain Amazon domains that could have allowed an attacker to access sensitive Alexa data, including voice histories and personal data, before they were fixed. A... Read more...
AMD has offered “PRO” branded Ryzen processors for a number of years. Although the base processor architecture and platform is unchanged versus their standard counterparts, Pro series Ryzen processors enable a number of security... Read more...
If you own a Samsung Galaxy handset that was released in the past six years, do yourself a solid and check for an over-the-air (OTA) software update. Left unpatched, every Galaxy phone dating back to 2014 is vulnerable to a so-called... Read more...
Google's Android operating system is the most populous in the world, and is used by hundreds of different smartphone OEMs. That large ecosystem along with OEMs that have varying timetables, resources, and "desire" to keep smartphones... Read more...
First ... Prev 3 4 5 6 7 Next