Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

If you thought putting Homer Simpson in charge of a nuclear power plant seemed like a scary proposition, well, you would be right. But sometimes truth is stranger (and in this case, scarier) than fiction. Such is the case with security... Read more...
There is good money to be earned from being an software exterminator. Several companies have so-called bug bounty programs in place in which they pay out rewards for rooting out certain software flaws and vulnerabilities. DJI, a major... Read more...
US Army recently banned the use of all drones built by drone maker DJI. The military warned that the drones might have unspecified "cyber vulnerabilities." The Army memo was published on August 2nd and read in part, "due to increased... Read more...
Dell as a company has been around for more than three decades and shows no signs of slowing down. But it was 20 years ago that Dell began selling Precision workstations to professionals. To celebrate two decades of Precision workstations... Read more...
Security researchers at Cybellum, a PC security firm in Tel Aviv, Israel, have discovered a rather nasty new zero-day attack that allows remote attackers to hijack popular antivirus programs and turn them into malicious agents. The... Read more...
Whether you use Linux at home or manage a Linux server, you'll want to waste no time in making sure your OS is completely up-to-date. An exploit called "Dirty COW" has now been revealed, and while it's not the most dangerous one ever... Read more...
Getting hit with ransomware, a form of malware that encrypts your files and holds them hostage until you pay the hacker responsible to decrypt them, is no laughing matter, at least if you're the victim. But for cyber crooks becoming ever... Read more...
It's no surprise that a number of exploitable security holes still exist in the operating systems we use each and every day. It's just the nature of the beast; we're talking about software that has hundreds of millions of lines of code... Read more...
A newly discovered attack vector is threatening to leave millions of websites underwater, gasping for air. Since we live in an acronym-crazed society, it should come as no surprise that this latest exploit described as Decrypting RSA with... Read more...
We talk a lot about the importance of businesses beefing up security to protect from the threat of those who might want to gain access to internal networks. Last week, we were given another great example of why: an integral piece of Linux... Read more...
To look at the Dell Precision 15 5510, you wouldn’t know that it sits in the middle of Dell’s workstation lineup. The laptop is thinner and sleeker than you might expect a workstation-class laptop to be and the premium carbon fiber palm... Read more...
The fight between the Department of Justice and mobile OS creators continues, and as it stands right now, things are not looking so great on the vendor side. Over the past few years, and the past year especially, both Apple and Google... Read more...
Adobe's Flash Player has more holes than Swiss cheese, only Swiss cheese doesn't leave you vulnerable to hacker attacks. Flash Player often does, and yet again, there's a zero-day exploit that could allow an attacker to take control of an... Read more...
"Xara" might sound like a cool name for an exploit, but according to researchers at three different US universities, it's one that should cause some alarm. At its root, if Xara is properly exploited, attackers would be able to procure... Read more...
Leading antivirus firm Kaspersky Lab said that it recently suffered a security breach involving at least three techniques that it had never seen before. The AV company described the attack as "one of the most sophisticated campaigns ever seen," though it believes it was able to detect the... Read more...
Before you even think about shopping for an Apple MacBook Pro for professional chores on the go, Dell wants you to give a long, hard look at its recently redesigned Precision M3800 Mobile Workstation. According to Dell, the M3800 is a superior product in several ways, and the OEM even put... Read more...
Think stealing hundreds of thousands of dollars from an enterprise organization is difficult? You might be surprised after learning about how the 'Dyre' malware that IBM has been tracking operates. Like most malware, Dyre needs to... Read more...
In case you were of the mind that airport travel wasn't a big enough pain as is, there's some good news to relay. If you'll be passing through Washington, DC's Dulles airport soon, you can plan on adding a new step to the routine. As... Read more...
Another day, another revelation of how the government has pushed its spying efforts a bit too far. This time, it involves our vehicles and the Drug Enforcement Administration (DEA). I'm sure that little bit of information speaks... Read more...
It's sad that we can't go more than a day lately without learning more about how governments love to eavesdrop on us, removing whatever privacy we have left. Just yesterday, we talked about the continued pressure law enforcement is putting... Read more...
It's been no secret that most law enforcement, including the biggest US government agencies, would rather encryption didn't exist outside of its own use. Just this past week, we saw the Department of Justice defend its stance on scooping... Read more...
You may have read in the news that hackers infiltrated Dropbox, stole seven million usernames and passwords, and then posted a portion of those login credentials online. Those reports stem from an anonymous post on Pastebin.com containing... Read more...
Prev 1 2 3 4 5 Next