Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

It should strike no one as a surprise at this point that the US and China have a bit of a strained relationship when it comes to trust. Both have accused each other of cyber offenses, and likewise, neither has much faith in the products it sources from the other. Post-Snowden, the situation has only become... Read more...
Last January, some six or so months after Edward Snowden exposed much of the NSA's shady behavior to the world, a smartphone was announced that promised unparalleled levels of security. Called BlackPhone, we followed-up a month later to provide a price, $629, and some specs. Quad-core, 2GB of RAM, 16GB storage... all standard fare for a good Read more...
Cloud storage companies don't just manage an obscene number of hard drives, they also deal with a huge number of failures. While most companies keep mum on things like failure rates, BackBlaze prefers to let the rest of us know who we should trust. You might recall that we reported on its first batch of findings... Read more...
Earlier this month, it was discovered that China was using man-in-the-middle (MITM) attacks against Microsoft Outlook and Mozilla Thunderbird email clients, as well as smartphone apps that use IMAP and SMTP protocols. Or did it? A spokesman for the Cyberspace Administration of China (CAC) claims the allegations that... Read more...
It's starting to look like the Lizard Squad saga is slowly reaching its conclusion, as UK police recently arrested another person with direct ties to the group. That development, however, isn't too interesting today; everything now coming out as a result is quite revealing. Security researcher Brian Krebs has been... Read more...
Fast food chain Chick-fil-A is in the news again, though this time it has to do with a recent security breach in which it appears that customers' credit card information was compromised. Chick-fil-A said it's been receiving reports of potential unusual activity involving payment cards used at a few of its restaurants... Read more...
An association of hackers known as Chaos Computer Club has found a way to reproduce fingerprints by using just a couple of photos of someone's fingers. The group explained its method at the 31st annual Chaos Computer Club convention in Hamburg, Germany, using the thumbprint of German Defense Minister Ursula von der... Read more...
Another day, another security revelation. This time, it comes from researchers in Germany, who've exposed some serious vulnerabilities in the SS7 set of protocols that cellular carriers use to perform many basic functions. At the core, SS7 (or signaling system #7) is used to keep people connected, moving them from... Read more...
Chinese OEMs are stepping up their game in the smartphone sector. Companies like Huawei and Xiaomi have bolstered their share of the market, with the latter booting Samsung out of first place in China. One Chinese OEM, however, is looking to expand its presence in the smartphone world while at the same time partaking... Read more...
If it hasn't been made clear enough in recent months that China would love nothing more than to cut down on its reliance to American technology companies, its just-announced decision to create its own operating system should remedy that. At first, this OS will target the desktop, but eventually, it'll make its way to... Read more...
Was your high-speed Internet service acting wonky yesterday? Are you a Charter customer? If you answered 'yes' to both questions, you're not alone. It appears that Charter, the nation's fourth largest cable operator, suffered a widespread outage in broadband Internet service starting on late Saturday afternoon and... Read more...
As the owner of two cats that have been indoor pets their entire lives, I couldn't imagine letting them wander outdoors. If that wasn't the case, though, I know exactly what I'd do: I'd make their adventure, my adventure. That's just what security researcher Gene Bransfield did with the help of his wife's grandmother's cat. With a collar... Read more...
China's concern over security and U.S. spying habits apparently don't extend over to popular Apple products like the iPad and MacBook Air as previously thought. Responding to a Bloomberg report earlier in the week saying that China removed 10 Apple products from its government procurement lists over security concerns... Read more...
We talked last week about the latest security issue to plague Google's ultra-popular Android OS, which at the time topped-off what seems like a never-ending list of issues researchers raise about the OS. With a just-released Cisco report, it looks like not a thing is going to change, much to Google's chagrin, I'm... Read more...
When NSA whistleblower Edward Snowden came forth last year with the US government's spying secrets, it didn't take long to realize that some of the information revealed could bring on some serious repercussions - not just for the US government, but also for US-based companies. The latest to feel the hit? None other than Apple, and in a region... Read more...
Facebook rolled out a new mobile feature that uses your device’s microphone to “hear” a song you’re listening to or a TV show you’re watching so you can append that item to a status post. Predictably, a lot of people believe that this is a feature designed for snooping and are not happy... Read more...
China's Central Government Procurement Center has reportedly issued a ban on installing Microsoft's Windows 8 operating system on government computers. The ban is supposedly in place to ensure computer security after Microsoft decided to end support for Windows XP last April, a legacy OS that was released to the... Read more...
Mere weeks after voting down legislation that would require smartphone makers to implement anti-theft technology into handsets, the California Senate on Thursday passed a revised version of the bill. As rewritten, technology titans Apple and Microsoft, both with vested interest in such a bill, withdrew opposition to... Read more...
The discovery of a security vulnerability in OpenSSH, which is a set of programs that provide encrypted communication sessions using the SSH protocol for an estimated two-thirds of the web, challenged the notion that anyone can ever be truly safe on the Internet, regardless of how careful you surf. How so? Researchers... Read more...
Now we’re talking: Cisco is putting up hundreds of thousands of dollars in an effort to deliver the security solutions necessary to protect the growing wave of connected devices in the Internet of Things. IoT security is a huge deal, both because of the potential disasters that could befall individuals... Read more...
You may have only paid $50 for your smartphone on subsidy, or even received it for free after inking a two-year service agreement with your wireless carrier. It's actually worth much more than what you bought it for -- several hundred dollars more -- making these easily swiped handsets mighty attractive to thieves... Read more...
It took all of a minute after Google announced Glass for privacy concerns to come to the forefront, and since then, the company has worked hard to calm everyone's fears. While Google itself might not bundle software that has the potential to invade someone else's privacy, there's little to stop a third-party... Read more...
First ... Prev 3 4 5 6 7 Next