Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

All statistics are notable in their own right, but once in a while, one comes along that seems downright mind-boggling. Take this one: 500 million people are currently affected by unauthorized cryptocurrency mining. Remember when pop-up ads were the biggest offense? That's child's play. If you run into a website... Read more...
Researchers have still been working their way through the hack that resulted in the very popular CCleaner security app being used as a host for malware. The initial attack was thought by many to have caused minimal harm to computer systems that were infected, but it looks like there was a secondary attack that may be... Read more...
We all know we should be changing our passwords on a frequent basis, at probably every quarter in general (and more or less often depending on the type of account and what information is accessible). It is easy to overlook, however, at least until something serves as a reminder. Well, let a recent leak hundreds of... Read more...
Cyber crooks have found a new way to ruin a person's day with ransomware. Traditionally most ransomware encrypts a victim's storage device and then demands a ransom in order to unlock the files. Some of the nastier versions will put a time limit on receiving payment before the ransomware starts permanently deleting... Read more...
There are many different ways of hacking into a person's email account. Some are rather sophisticated and involve a lot of effort, while on the end of the spectrum a scheme known as phishing is one of the easiest methods—all you need is a cooperative victim with limited technical savvy. Hackers found both in John... Read more...
So here we go again, another "massive and sustained Internet attack" made possible by a large collection of hacked Internet of Things (IoT) devices, things such as CCTV video cameras, digital video records, all sorts of smart home gadgets with a connection to the Internet, KrebsOnSecurity has determined. This is not... Read more...
Given the quick pace that today’s technology progresses, we’re used to seeing products with a few software and even hardware bugs. While software bugs can often be squashed with competent coding, hardware bugs can be a bit more difficult to tame. Such is the case with a bug that afflicts Cisco’s ASR 9000 Series... Read more...
We wrote a couple of days ago about a huge treasure trove of alleged NSA-derived exploits that were hitting the market. That gold mine was accessed by a group calling itself Shadow Brokers, and it's been said that their source was Equation Group, which is believed to be an extension of the NSA. At that time, there... Read more...
With Nintendo's latest game - a mobile one, at that - the company has proven that there is still a lot of innovating to do in the market. While Pokemon GO is based on another title, Ingress, any game is going to have a greater chance of success when it features one of the most popular franchises ever. GO isn't just... Read more...
If you're passionate about the topics of privacy, government surveillance, and security and also how they relate to the FBI and DOJ's fight to unlock that fateful San Bernardino iPhone, the whole situation likely pales in comparison to what communist countries like China force their citizens to tolerate. In an effort... Read more...
A hot topic brought up often in the search for America's next president is the security and privacy of the country's citizens. Unfortunately, such matters rarely find themselves in the hands of politicians who truly understand what they're talking about, and we saw just such an example again Saturday night, during the... Read more...
California has just landed itself a landmark victory in the fight for better protections of people's rights, and given what it entails, all we can do is hope that the state becomes an example that all others will want to follow. In the past, law enforcement hasn't had much of a stumbling block when it's come to... Read more...
Where computer security is concerned, it almost seems like unauthorized access can be granted via an unlimited number of ways. While computer security in the home is obviously very important, having good defenses in the enterprise market is paramount. In some cases, slipping up could result in the loss of millions of... Read more...
Here we go again. Researchers for Tangible Security have discovered three major vulnerabilities which strike at least three different Seagate enclosures - the Seagate Wireless Plus Mobile Storage, Seagate Wireless Mobile Storage, and LaCie FUEL - equipped with firmware 2.2.0.005 or 2.3.0.014. As these things go, other... Read more...
Karma's a dirty little devil, a fact that as many as 37 million unfaithful online users may find that out the hard way. That's because the hackers who infiltrated Ashely Madison, a dating website for married folk to practice infidelity under the tagline "Life is short. Have an affair," published a cache of personal... Read more...
Maybe someday the Chinese government will take a page from O.J. Simpson and write a book titled, "If I Did It: Confessions of a Hacker." After all, China is clinging to the innocence card just as adamantly as Simpson, never mind any evidence to the contrary. In fact, not only is the Chinese government saying it's not... Read more...
If the state of the US government's security wasn't appalling before, it sure should be now. Earlier this month, we reported on a breach of government systems that saw the information of four million current and prior government employees get taken by a third-party -- a third-party that was highly believed to be... Read more...
The parade of banks, insurance companies and retailers that have suffered data breaches has caused many people to store their passwords with sites like LastPass. The security company creates a unique password for each of the user’s logins and provides access to those passwords via a single, master password. Now, LastPass is admitting that Read more...
Security firms and anti-malware providers sure do have their work cut out for them, a fact that seems to get emphasized every day. As attackers become more creative, researchers have to dig deep in order to understand how malware manages to hide itself so well. It used to be that static scanners would be suitable... Read more...
We reported a couple of weeks ago that GitHub was hit with a massive DDoS attack, and given the projects that were targeted; it was widely assumed that China was behind the attack. Now, there's even more evidence of that, and it appears that a brand-new weapon was used to carry the attack out. According to a report... Read more...
Slack, the fast-growing startup previously known as Tiny Speck, has rolled out an optional two-factor authentication feature in response to a recent hacker attack. The company confirmed there was unauthorized access to its database containing user profile information, and though it was quick to respond and made... Read more...
It's bad enough when you're in possession of a database containing 80 million customer records and it gets hacked. But what's even worse than that is when you fail to encrypt all that data. Such is the unfortunate situation facing Anthem, the second largest healthcare provider in the U.S., and its tens of millions of... Read more...
First ... Prev 2 3 4 5 6 Next