Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

The nasty WannaCry outbreak has us all a little bit on edge. It also serves as a sobering reminder that a simple phishing scam can still create quite a bit of havoc. Sure, savvy PC users know better than to click on mysterious URLs in emails and instant messages, but for the bad guys, it's simply a numbers game—throw... Read more...
If you're using Google's Chrome browser as your primary vehicle to surf the web, you may want to think about temporarily parking it and puttering around in something else. That's because the most recent version of Chrome is vulnerable to a devious phishing attack, one that is capable of spoofing a legitimate website... Read more...
New and used games retailer GameStop has found itself in a bit of a rough patch these days. The company recently reported less-than-stellar fourth quarter results and is planning to close at least 150 brick-and-mortar locations, and perhaps as many as 225. That is on top of the store locations it closed just a few... Read more...
Mac users that prefer to browse the Internet with Google Chrome (instead of Safari) can now sleep more peacefully at night. Google’s “Safe Browsing” is working to increase its protection of computers running macOS. Google is now focusing more on macOS-specific malware and unwanted software. The most common abuses... Read more...
Microsoft has a long and somewhat bumpy road in the antivirus field. Even its latest AV solution, Windows Defender, has not always garnered praise, though that is beginning to change. A recent blog post by a security expert who heaped praise on the default security software in Windows has prompted others to come out... Read more...
For what we're sure are obvious reasons, Google has long blocked certain types of attachments from being sent through its Gmail service. Those include .bat (Windows Batch), .exe (Windows executable), and .msc (Microsoft Management Console). Soon, .js (JavaScript) will be joining the prohibited ranks. This is the... Read more...
It's been proven that some tech companies have been willing to cater to the government's every need, but others -- namely Google -- remain adamant about transparency regarding shady practices. Earlier this year, we reported on Google's new feature that informs users if they've become the target of state-sponsored... Read more...
Google has a message for webmasters serving up malware and it goes something like this: Fool me once, shame on you. Fool me twice, shame on me. Going forward, Google is plugging what it calls a "gap" in its online protection scheme that allowed sites serving up malicious content to become repeat offenders without much... Read more...
Ahmed Mehtab, a student from Pakistan and the CEO of Security Fuse, is in the running to score a $20,000 payday from Google's bug bounty program. While there remains some red tape to clear, Mehtab is likely to receive the bounty for discovering a rather crafty flaw in Gmail relating to its authentication and... Read more...
There's been no shortage of stories regarding Android security of the years, a fact that has worried some fans of the "openness" of the OS. Each new security story makes it seem more likely that the OS will become a little more locked-down, a la iOS. Well, that might not happen after all, because as it stands today... Read more...
Once again Google and Microsoft are at odds over the former's decision to disclose a zero-day vulnerability affecting the latter's Windows operating system. Google alerted both Adobe and Microsoft on October 21, 2016, of previously disclosed security flaws it discovered and in the time that has passed Adobe has issued... Read more...
The last thing you want to do is broadcast your bank or other sensitive login credentials for any Nosy Nellie to see. That's why a properly secured website asking for your confidential information uses encryption. Starting soon, Google's Chrome browser will tattle on websites that fail to secure your passwords and... Read more...
Here's a reminder to always check the URL of a website before entering in your login details, folks. That bit of safe computing advice applies to all online services, both big and small. Lest anyone doubt that, security researcher Aiden Woods recently notified Google of a potential security flaw in the way it handles... Read more...
Gigabyte, Corsair and Intel held a press event in California on June 30th to show off some of their new hardware. Though Intel just talked broadly about its thoughts on the PC gaming market (it's growing, and they are committed to it, basically), Gigabyte and Corsair both demo'd high-end gear it first unveiled at... Read more...
Security researchers on Google's Project Zero team have discovered critical security flaws in several of Symantec's software security products, including its popular Norton line for consumers and Endpoint Protection for enterprises. No small thing, among the vulnerabilities are several wormable remote code execution... Read more...
It's a dangerous online world out there and to keep the bad guys at bay, many companies require that employees use two-factor authentication. Typically the second method of verification entails tapping a Security Key or entering a verification code that's sent to a mobile device, but to make things easier Google is... Read more...
Using passwords as a form of security may not be long for this world, not if Google gets its way. The Mountain View outfit's ATAP (Advanced Technology and Projects) division is hard at work on Project Abacus, a scheme that relies on biometric data to determine a person's identity rather than relying on traditional... Read more...
Last week, we learned about the company teaming up with others, such as Microsoft and Yahoo, to make SMTP 'Strict Transport Security' a reality, a protocol that would make it even harder for malicious users to gain access to our email. In a new blog post, the company draws our attention to SMTP STS as well as a couple... Read more...
If as a child you told your parents you wanted to be a bug hunter when you grow up, they'd probably dismiss the notion before telling you to go wash your hands before supper. But had you stuck with it, you could now show your parents just how lucrative it is to hunt bugs—programming bugs, that is. In fact, you can collect a cool $100,00 for Read more...
Even for mainstream users, it's not hard to tell the differences between using a PC that has its OS installed on a solid-state drive versus a mechanical hard drive. With an SSD, the OS will start up faster, while apps and multi-tasking won't bring certain processes to an absolute crawl. With SSD pricing where it is... Read more...
It's not often that people feel compelled to side with Google on the topic of privacy, but the company's newest CEO, Sundar Pinchai, gives us a great reason to. As Brandon covered in great detail yesterday, Apple has been ordered by U.S. Magistrate Judge Sheri Pym to provide the FBI access to an iPhone 5c that was... Read more...
It seems certain that we've all managed to wind up on a website at some point in time that had misleading elements, such as fake download buttons. While piracy is going to be the first thing that springs to many minds when this kind of sketchiness is brought up, it's hardly exclusive to that area. Some websites that... Read more...
First ... Prev 4 5 6 7 8 Next