Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

There is a rash of complaints on Twitter over a recent Instagram hack that has left numerous users unable to access their accounts. Preliminary data suggests that the shenanigans originate from Russia, though nothing has been confirmed. Instagram is investigation the issue, and in the meantime, it has some advice for... Read more...
A new attack that takes advantage of flaws that are inherent to LTE technology has surfaced called aLTEr. The exploit was discovered by an international team of security researchers and is able to redirect users to hostile websites. The exploit works in part by taking advantage of the fact that there is no integrity... Read more...
It’s evolving. Alienware’s Area-51 is back with new upgrades to accommodate Intel’s most demanding enthusiast CPU yet – the Core i9-7980XE. Sure, on the surface everything seems similar to previous iterations of the machine, but within something new courses through its veins. The new Alienware... Read more...
A pair of macOS security experts have discovered a bug in the latest version of macOS that exposes the contents of files, including ones that are encrypted and are supposed to be safe from prying eyes. The security flaw exists within Apple's 'Quick Look' feature, which caches thumbnails and names of files, even when... Read more...
Apple has confirmed plans to bolt shut a security hole in iPhone devices that law enforcement agencies have been using to gain entrance into locked handsets after seizing them from suspected criminals. As can be imagined, those same agencies are none too pleased with Apple's decision. As far as Apple is concerned... Read more...
For many people, digital assistants have become a party of daily life—you might have Siri set a reminder for an upcoming appointment on your iPhone, or tell Alexa to order more laundry detergent from Amazon. These AI (artificial intelligence) assistants are becoming more capable by the day as well. But can they be... Read more...
The Federal Bureau of Investigation butted heads with Apple in 2016 and 2017 when the Cupertino company refused to build a backdoor into its iPhone handsets, which would allow law enforcement agencies to access locked devices at the expense of security for millions of iOS users. Fast forward to today and there's a... Read more...
Given the industry-wide panic that was unleashed following the disclosure of the Meltdown and Spectre processor vulnerabilities (with Intel taking the brunt of the heat), many are on edge about the potential for similar exploits to be discovered in other products. Unfortunately, for those that are running AMD's... Read more...
Alexa is constantly gaining new skills with some coming directly from Amazon, and other skills coming from third-party programmers. One of the latest skills that Alexa has picked up is one that can help you control your wireless network. At MWC 2018, McAfee announced a new Alexa skill that lets you check on the... Read more...
Back in 2016, Google's parent company Alphabet started a new cybersecurity project at its X Moonshot lab. Now two years later, that project is graduating into a standalone company called Chronicle, with the aim of helping other firms find and stop cyber attacks before they can cause any harm. It will do this through a... Read more...
AMD is getting out in front of the impending influx of CES-related announcements and unveiling a number of upcoming chip products for the new year. After ramping 10 new product lines in 2017 -- if you consider its entire breadth of CPUs, GPUs, and semi-custom APUs -- AMD is readying more new and/or updated products... Read more...
Another day, another Face ID fail that allows unauthorized people to log into the iPhone X. This time around, no creepy masks or 3D printing hardware was needed. The two women who can unlock the same iPhone X are not even related, as we have seen in the past when a child was able to unlock his mother's iPhone X using... Read more...
Google has announced that it has beefed up its efforts to keep Android users safe by expanding the enforcement of its Unwanted Software Policy. The updated policy will help Google to reduce unwanted and harmful behavior on Android. Android users will now see Google Safe Browsing warnings on app and websites that... Read more...
Apple seems to be having a tough time getting out of its own way, in regards to a dopey security flaw that was recently discovered and fixed. The flaw allowed users to gain administrative access to systems running macOS High Sierra by typing "root" for the username and leaving the password blank. Apple rolled out a... Read more...
iPhone X users must be feeling a little unsure of their Face ID security. Recently we have seen a son unlock his mother's phone using his own face just because they look alike. A security firm from Vietnam called Bkav was able to defeat Face ID security earlier this month using an ornate mask. Bkav is back at it again... Read more...
Here we go again. In 2016, authorities tried to legally compel Apple to unlock an iPhone model that belonged to one of the terrorists in the San Bernardino shooting that left more than a dozen people dead. Apple resisted, and the Federal Bureau of Investigation dropped its lawsuit before the legal matter had a chance... Read more...
The Federal Bureau of Investigation (FBI) has been unable to access data on a locked smartphone that belonged to Devin Patrick Kelly, the individual who opened fire in a church in Sutherland Springs, Texas, leaving 26 people dead and several others injured. In a subsequent press release, the FBI identified the handset... Read more...
As part of AMD's comeback tour into the high-end market sector, it released new CPU and GPU architectures, Zen and Vega respectively. And with Zen, AMD has been focused on attacking every market sector, including mainstream desktops (Ryzen 3/5/7), high-end desktops (Threadripper), mobile (Ryzen 5 Mobile, or Raven... Read more...
It used to be that Macs were thought to be nearly immune to malware, viruses, and serious security issues. That certainly isn't the case with modern Macs because as the user base has grown, the amount of malware and viruses targeting the platform has also grown. Back in June, we talked about malware-as-a-service... Read more...
It's not uncommon for us to write about security issues, but it's pretty rare when we write about one that's not going to be fixed, per the guilty party. In this case, that guilty party is Microsoft, and the bug is one that has been around ever since the launch of Windows 2000. Whether or not it's truly severe, we'll... Read more...
Because there clearly haven't been enough ISP router vulnerabilities popping up this past year, another one helps usher in the new month. This one is being dubbed "SharknAT&To" (because every vulnerability needs a catchy name!), a portmanteau involving the cult classic in-the-making, Sharknado, and leading internet... Read more...
Yesterday, a video hit YouTube that could have been alarming to any Apple users anyone running an iPhone 7 or 7+, or even some iPhone 6 models. With a $500 device in hand, simple iPhone passcodes could be defeated quickly and easily, with the help of a brute force password-hacking tool. Many passcodes are just 4... Read more...
First ... Prev 6 7 8 9 10 Next