Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Security researchers at Cybellum, a PC security firm in Tel Aviv, Israel, have discovered a rather nasty new zero-day attack that allows remote attackers to hijack popular antivirus programs and turn them into malicious agents. The technique is called DoubleAgent, named after the fact that a compromised antivirus... Read more...
Whether you use Linux at home or manage a Linux server, you'll want to waste no time in making sure your OS is completely up-to-date. An exploit called "Dirty COW" has now been revealed, and while it's not the most dangerous one ever released, the fact that it's been around for nine years is causing some serious alarm... Read more...
Getting hit with ransomware, a form of malware that encrypts your files and holds them hostage until you pay the hacker responsible to decrypt them, is no laughing matter, at least if you're the victim. But for cyber crooks becoming ever more brazen, the temptation to taunt victims and security researchers is... Read more...
It's no surprise that a number of exploitable security holes still exist in the operating systems we use each and every day. It's just the nature of the beast; we're talking about software that has hundreds of millions of lines of code. Despite a developer's best efforts, it's virtually impossible to release... Read more...
A newly discovered attack vector is threatening to leave millions of websites underwater, gasping for air. Since we live in an acronym-crazed society, it should come as no surprise that this latest exploit described as Decrypting RSA with Obsolete and Weakened eNcryption goes by the name of "DROWN." DROWN preys on... Read more...
We talk a lot about the importance of businesses beefing up security to protect from the threat of those who might want to gain access to internal networks. Last week, we were given another great example of why: an integral piece of Linux software suffered a bug that at first seemed modest but turned out to be quite... Read more...
To look at the Dell Precision 15 5510, you wouldn’t know that it sits in the middle of Dell’s workstation lineup. The laptop is thinner and sleeker than you might expect a workstation-class laptop to be and the premium carbon fiber palm rest gives the system a decidedly high-end vibe. But the Precision 15 5510 is... Read more...
The fight between the Department of Justice and mobile OS creators continues, and as it stands right now, things are not looking so great on the vendor side. Over the past few years, and the past year especially, both Apple and Google have been battled against for allowing users of their respective OSes to encrypt... Read more...
Adobe's Flash Player has more holes than Swiss cheese, only Swiss cheese doesn't leave you vulnerable to hacker attacks. Flash Player often does, and yet again, there's a zero-day exploit that could allow an attacker to take control of an affected system. The discovered vulnerability and its severity has led to Adobe... Read more...
"Xara" might sound like a cool name for an exploit, but according to researchers at three different US universities, it's one that should cause some alarm. At its root, if Xara is properly exploited, attackers would be able to procure passwords stored in OS X's Keychain, which could be used for most or all of... Read more...
Leading antivirus firm Kaspersky Lab said that it recently suffered a security breach involving at least three techniques that it had never seen before. The AV company described the attack as "one of the most sophisticated campaigns ever seen," though it believes it was able to detect the intrusion at an early stage, thereby mitigating the Read more...
Before you even think about shopping for an Apple MacBook Pro for professional chores on the go, Dell wants you to give a long, hard look at its recently redesigned Precision M3800 Mobile Workstation. According to Dell, the M3800 is a superior product in several ways, and the OEM even put together an infographic showing more than half a dozen... Read more...
Think stealing hundreds of thousands of dollars from an enterprise organization is difficult? You might be surprised after learning about how the 'Dyre' malware that IBM has been tracking operates. Like most malware, Dyre needs to infect a PC in order to work. This can be done via a number of different methods, but... Read more...
In case you were of the mind that airport travel wasn't a big enough pain as is, there's some good news to relay. If you'll be passing through Washington, DC's Dulles airport soon, you can plan on adding a new step to the routine. As part of a “test”, those coming back to the U.S. through Dulles may be chosen to... Read more...
Another day, another revelation of how the government has pushed its spying efforts a bit too far. This time, it involves our vehicles and the Drug Enforcement Administration (DEA). I'm sure that little bit of information speaks volumes. In order to better combat the import and movement of drugs, the DEA has been... Read more...
It's sad that we can't go more than a day lately without learning more about how governments love to eavesdrop on us, removing whatever privacy we have left. Just yesterday, we talked about the continued pressure law enforcement is putting on companies like Apple and Google regarding encryption on their respective... Read more...
It's been no secret that most law enforcement, including the biggest US government agencies, would rather encryption didn't exist outside of its own use. Just this past week, we saw the Department of Justice defend its stance on scooping up user data en masse, and in September, we talked twice about the 'major... Read more...
You may have read in the news that hackers infiltrated Dropbox, stole seven million usernames and passwords, and then posted a portion of those login credentials online. Those reports stem from an anonymous post on Pastebin.com containing what the author claims is a data dump of 400 Dropbox accounts, calling it the... Read more...
One of the original big features of Google's Glass was facial recognition, but after catching a ton of flack for it, the company decided last summer to purge the feature on its cutting-edge device. However, while that might be the case, the company is finding it impossible to distance itself from the fact that Glass... Read more...
Life certainly has become complicated ever since we stopped bartering goods and services with our neighbors in favor of using cash and credit. Think you're safe to go shopping with your debit card at a major retailer? You'd be mistaken -- according to an advisory put out by the Department of Homeland Security, over... Read more...
A lot has sure changed in the past year, especially since the time before Edward Snowden, who we talked about yesterday, came forth with his NSA revelations. Anyone who cared about hiding their identity pre-Snowden were generally considered privacy nuts. But post-Snowden, the desire to keep private online suddenly... Read more...
Wireless security has always been something of a problem. Basic WEP encryption, for example, has been beaten so soundly that it’s a wonder device makers even offer it as a security option anymore. Fortunately, we’ve had WiFi protected access 2 (WPA2) keeping our networks safe--but perhaps no longer. According to Phys.org, researchers... Read more...
Prev 1 2 3 4 Next