Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Apple is bringing some color into people's lives with a new line of M1-powered iMac systems, available in green, yellow, orange, pink, purple, blue, and silver. As to what other changes Apple plans on making to its product lines, a hacking group is threatening to reveal them, after infiltrating servers belonging to... Read more...
As an iPhone user for the past several years, there have been times when I wished there was a way to side-load apps, without resorting to a process known as jailbreaking, which typically involves exploiting a vulnerability to to remove software restrictions. Well, guess what? It is not going to happen any time soon... Read more...
Intel was raked over the coals three years ago when Spectre and Meltdown vulnerabilities were first discovered that could affect its consumer and enterprise processors. The company addressed the side-channel exploits with patches and subsequent hardware revisions, but AMD is now coming under the microscope for a... Read more...
AMD just launched its next-generation EPYC server processors, codenamed Milan, based on the company’s leading Zen 3 microarchitecture. The new EPYC 7003 series is an important milestone for AMD. The company has made significant in-roads in servers and data centers in recent years, and the arrival of the EPYC 7003 series brings with it... Read more...
If there is one thing I learned from cartoons in the 1980s, it is that knowing is the half the battle. Thank you G.I. Joe for that tidbit. Fast forward several decades later and that lesson is playing out right before our very eyes, in relation to another malware strain that is able to run natively on Apple's fancy... Read more...
Apple is embarking on a two-year plan to transition away from using Intel processors across its laptop and desktop families, in favor of its own Arm-based silicon. The venture begins with the M1, an impressive piece of hardware that is generally garnering favorable reviews (including our own Mac mini 2020 review with... Read more...
In this episode of Misbehaving Bots, automated Telegram miscreants have been found selling private Facebook user data in an unscrupulous forum, for $20 a pop (or even less). Maybe this is why the bots gobbled up all the latest generation CPUs, graphics cards, and game consoles—it's not cryptocurrency mining, but... Read more...
If you give some kids restricted access to technology, they are bound to find a loophole or bug that lets them do what they want regardless. After being asked by his kids to “hack” his Linux desktop, one Dad let the kids play with the keyboard. This button-mashing actually crashed the machine's screensaver by sheer... Read more...
We've got 99 problems but Windows 10 ain't one. Just kidding—sometimes Windows 10 is one of those problems. We've had good luck with Windows 10 ourselves, but are aware of various issues people have encountered over the years. One of the stranger ones is a lingering bug that could easily corrupt your hard drive, just... Read more...
Cupertino, we may have a problem. A researcher claims Apple's T2 security chip is vulnerable to an exploit that, if leveraged, would give an attacker full root access and kernel execution privileges. Normally this sort of thing would necessitate fast tracking a security patch, except for one very big problem—it is an... Read more...
Amazon is currently training a bunch of psychics, who will then license their talents to businesses across the US to read people's palms to determine their future, specifically to see if they pose a security threat. Just kidding! There will be no psychic readings, but the retail giant is rolling out Amazon One, which... Read more...
Traditionally, Macs weren't often a target for malware campaigns given their relatively small share of the overall computing market. This notion has changed over the years, however, but Apple has fought back with increased security procedures like an app approval process called notarization. Unfortunately, malware has... Read more...
Security researchers recently discovered multiple vulnerabilities within certain Amazon domains that could have allowed an attacker to access sensitive Alexa data, including voice histories and personal data, before they were fixed. A hacker would have also been able to install and remove skills from a targeted... Read more...
AMD has offered “PRO” branded Ryzen processors for a number of years. Although the base processor architecture and platform is unchanged versus their standard counterparts, Pro series Ryzen processors enable a number of security, reliability, and manageability features targeted at the enterprise market, where Intel’s... Read more...
If you own a Samsung Galaxy handset that was released in the past six years, do yourself a solid and check for an over-the-air (OTA) software update. Left unpatched, every Galaxy phone dating back to 2014 is vulnerable to a so-called 'zero-click' bug related to Android's handling of the custom Qmage image format... Read more...
Google's Android operating system is the most populous in the world, and is used by hundreds of different smartphone OEMs. That large ecosystem along with OEMs that have varying timetables, resources, and "desire" to keep smartphones updates has led to fragmentation. It's why we see new devices still be announced in... Read more...
For what feels like the umpteenth time this has happened, a string of specific text is causing iOS devices to crash when received, including iPhones, iPads, and Apple Watches. The malicious text is going viral, and as of this writing, has not been addressed with an iOS update (we imagine one will arrive soon). Even... Read more...
Earlier this week, it was reported that a zero-day exploit has been running in the wild that targets the iOS Mail app. First discovered by the researchers at ZecOps, the vulnerability has been labeled as "zero-click" because it allegedly needs no intervention from the user to attack an iPhone or iPad running even the... Read more...
If you're an Apple iPhone or iPad owner that uses the native Mail app for emailing purposes (and that probably includes a marjory of iOS users), we have a word of caution for you. The folks over at ZecOps have uncovered a vulnerability in the app that is currently active in the wild, pending a fix from... Read more...
AMD has been making some steady gains in desktop market share with its Ryzen 3000 processors, and has even showed some great promise with its newly released Ryzen 4000 mobile processors. But another segment that is incredibly crucial to AMD with respect to margins is the server market.  Intel has long been a... Read more...
AMD is further fleshing out its professional workstation graphics cards line-up, with an additional Navi-based offering that targets a more affordable price point. The Radeon Pro W5500 we will be showing you here offers essentially the same feature set as its more powerful cousin, the Radeon Pro W5700, but it's outfitted with a scaled down... Read more...
iPhone users should be aware that there is an unpatched security vulnerability that impacts iOS 13.3.1 and later versions of the operating system (including the newly released iOS 13.4). This unpatched security vulnerability prevents VPN networks from encrypting all traffic and can cause some Internet connections to... Read more...
First ... Prev 3 4 5 6 7 Next