Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Over the past couple of years, we've discovered case after case that highlights the extent the US government is willing to go to spy on whoever it can. It's an interesting juxtaposition, then, to keep learning about new revelations that show how the US government itself has been spied on, while remaining completely... Read more...
We’ve all heard about Wi-Fi — the ubiquitous wireless networking standard is commonplace in just about all of our gadgets (smartphones, tablets and notebooks) and even our cars, as well as some home automation and IoT products. It’s hard for most people not to go a day without using Wi-Fi at some point, and with... Read more...
It's estimated that half of all smartphone shipments will have a fingerprint scanner within the next four years. Many smartphone owners already use them, whether it's for unlocking a device or making a mobile payment. That's great for convenience -- it beats having to bang out a hard-to-guess password -- but as far as security is concerned, Read more...
We reported earlier this week that a Jeep Cherokee could be remotely accessed and controlled, and I wouldn't blame anyone for being a skeptic. After all, what are the chances of someone remote being able to disable the transmission? Well, with Fiat Chrysler's response, I think that question has been answered. In a... Read more...
Has the time come to put Adobe's Flash Player plugin out of our misery? Facebook CSO Alex Stamos thinks so. In a series of Twitter posts, Stamos makes a plea for Adobe to set a date to euthanize Flash, allowing the web and Internet users at large to move on to better (and more secure) technologies. The question is... Read more...
Federal Communications Commission (FCC) chairman Tom Wheeler has asked the wireless industry to voluntarily support the addition of features that would make it more difficult and/or less desirable for for thieves to steal mobile phones. A couple of the measures the FCC would like to see smartphone makers and wireless carriers adopt include Read more...
The FTC has just laid the smackdown on yet another company that's been found guilty of exploiting mobile users without their knowledge. The FTC found that the company, called Nomi Technologies, even went against its own privacy policy mere months after it promised not to, in late 2012. Nomi's business model... Read more...
Bad news, Windows users. Remember that old bit of code that was causing new headaches for iOS and Android device owners? Dubbed "FREAK," it was initially thought that the exploit only affected some mobile browsers, but that's no longer the case. Microsoft has issued a security advisory (3046015) warning that FREAK... Read more...
Hot on the heels of president Obama's insinuation that the government should never have an issue accessing a person's data comes an even scarier prospect -- being the victim of a search warrant just because you take steps to enhance your privacy. As it happens, that could become the reality, if the FBI gets its... Read more...
One of the things we're not looking forward to in 2015 is a continuation of cyberattacks against companies big and small. For whatever reason, hackers have been on a rampage in 2014, hitting banks and retailers like Target, Home Depot, and others. It's gotten so out of hand that some companies have started hacking back. According to Bloomberg, Read more...
It would seem that the ones responsible for hacking Sony Pictures Entertainment in a massive ransomware attack weren't just a bunch of script kiddies hiding out in a basement somewhere. That wasn't really a prevailing theory anyway, but lest there's any doubt about the seriousness of the security breach, the FBI is... Read more...
The Federal Trade Commission (FTC) is bringing the legal hammer down on tech support scammers who trick people into thinking there's something wrong with their computer that they're able to fix, or otherwise offering to speed up your PC. What they're really doing is charging for services that aren't necessary, though... Read more...
In the wake of former NSA contractor Edward Snowden's big reveal on government spying, there's been a concerted effort by companies big and small to try and make our lives truly private. One seemingly promising solution was Anonabox, a little plug-and-play device that routes traffic through Tor to keep our online... Read more...
More details have surfaced on how the FBI uses its own custom malware to penetrate the Tor network's anonymizing service -- and while those tools have been deployed in some important investigations, it's sure to raise hackles in the post-Snowden era. Several years ago, the FBI launched a major sting operation against... Read more...
Don’t freak out, but Facebook is testing a new feature that would put “Buy” buttons on ads within the social network. Simply, users would see an ad, and the ad would have a button that you could click to purchase the item you see, all without leaving Facebook. This is an obvious evolution of having ads on Facebook, and it... Read more...
Google's open source Android platform has the distinction of being the most popular mobile operating system in the world. That's great in terms of dominating the market and reaping the rewards that come with it, but it's also for that very reason that Android finds itself the target of virtually every new mobile... Read more...
Some might consider it to be a major breach of privacy, but Facebook sees it as a major feature. With "Nearby Friends", the Facebook mobile app will be able to tell you if any of your contacts are - as you'd expect - nearby. This feature was first rumored just over a year ago, and at the time, many were up-in-arms -... Read more...
If you're willing to accept at face value Flappy Bird developer Dong Nguyen's public stance on why he removed the popular title from iTunes and Google Play, then perhaps a bit of kudos are in order, even if you don't agree with his decision. It's not often that you see a sense of responsibility trump the almighty dollar, and in this case,... Read more...
Wondering why it's still a good idea to run security software on your system even if you practice safe computing habits? One reason is because even legitimate websites get hacked, and depending on the extent of the attack, visiting what you thought was a benign domain could open up a can of worms. It doesn't matter how large the site is either... Read more...
To those of you who are using "password" to secure an account, you can rest slightly easier at night knowing that it longer tops the list of worst passwords. Two-time runner up "123456" has taken the dishonor of being the most common used password found on the Internet, giving the six-character combination the... Read more...
Up to now, viewability of kids’ Facebook accounts was set by default to “Friends of Friends”; now, those aged 13-17 start out with their audience set to “Friends” by default. However, they can also make their posts public, and they can turn on “Follow” to let their posts show... Read more...
Are you browsing this very article using a notebook? If so, the trackpad you're probably scrolling with most likely has Synaptics attached in some way. The company responsible for millions upon millions of laptop trackpads has just acquired a human interface solutions company by the name of Validity Sensors. The... Read more...
First ... Prev 3 4 5 6 7 Next