Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Malware campaigns employ different techniques to smuggle malicious software onto computing devices without the notice of users or anti-virus systems. Threat actors who develop and distribute malware frequently rely on various forms of... Read more...
Macros can be highly useful tools in Microsoft Office. Most Microsoft Office macros use Visual Basic for Applications (VBA) or Excel 4.0 macros (XLM). These programming and macro languages have a surprising amount of access to system... Read more...
Malware spammers have been sending out emails that leverage a legitimate copy of the Windows Calculator app to sideload malware. This is yet another cunning ploy by cyber threat actors, however the victim would have to willingly go through... Read more...
Earlier this year, multiple US law enforcement agencies completed a joint operation with authorities from the United Kingdom, Europol, Portugal, Germany, Sweden, and Romania. This coordinated police action, dubbed Operation TOURNIQUET... Read more...
If you own a modern desktop PC or laptop, or even one that's a bit older, you're probably affected by a newly discovered family of side-channel attack vectors that have been dubbed Hertzbleed. In separate security advisories, Intel... Read more...
Personal information is also valuable information, as personal data in the wrong hands can empower cybercriminals to commit identity theft and fraud. However, even those who take important steps to secure their personal information can... Read more...
Cybersecurity experts are constantly trying to improve user account security. This task can be a difficult one when users don’t take basic steps to secure their own accounts. A recent report found that the most commonly used passwords... Read more...
Security researchers from the Technical University of Darmstadt in Germany have found that even if an iPhone has been powered off, some segment of its wireless connectivity remain active in the device. Most notable is Bluetooth, though NFC... Read more...
Unlike driver updates, BIOS releases typically arrive far less often—usually when vendors add support for new CPUs, but also occasionally to improve stability and performance, or to address security vulnerabilities. Regarding the latter... Read more...
Have you ever Googled yourself and stumbled upon some less than savory information or simply something you wouldn't want to be easily found? As Google states, it's important to control how people can find your sensitive, personally... Read more...
Cybercriminals are constantly on the hunt for vulnerabilities to exploit, and over the past six months it seems they've been ramping up their efforts to find weaknesses within Apple's ecosystem. According to a recent security report, the... Read more...
We're roughly half way into April and you know what that means—it's time to patch Windows with this month's Patch Tuesday update (KB5012599 for Windows 10 and KB5012592 for Windows 11), which is doled out on the second Tuesday of every... Read more...
As gas prices continue to rise, some shadowy figures are looking for "alternative" method to acquire fuel, whether legal or not. One such method, specifically hacking a gas pump, has led to the recent theft of 400 gallons of fuel at a High... Read more...
Have you ever received an Amazon delivery, but did not remember placing an order for the item? There are plenty of stories like this online, which sometimes boil down to having one too many libations during an attitude adjustment hour. But... Read more...
This story continues to get stranger. On the 25th, The Telegraph ran a story claiming to have insider knowledge of a hack at NVIDIA HQ. At that time, it wasn't known who was responsible or what their motives were; The outlet speculated... Read more...
This week, the Cybersecurity and Infrastructure Security Agency (CISA) published a “Free Cybersecurity Services and Tools” webpage outlining what can be done for security incidents, intrusions, preparation, and resilience against... Read more...
HP, which maintains a threat analyst team, has released a post on its threat research blog detailing a tricky new malware campaign. Only a day after Microsoft announced that Windows 11 was entering its final phase of availability, becoming... Read more...
In one of the largest DeFi hacks ever, a hacker is being offered a $10 million bug bounty for the return of stolen money. Wormhole, one of the biggest bridges between Solana and other blockchains, was hacked for approximately $324... Read more...
Practically anything and everything can be accomplished online these days, and that obviously includes applying for a job. As it relates to that, the Federal Bureau of Investigation (FBI) posted a notice warning that scammers are preying... Read more...
This week, a security vulnerability in Dark Souls 3 was discovered, allowing remote code execution (RCE) and any threat actor to wreak havoc on your PC. As this vulnerability only affects players who play online, potentially across the... Read more...
If you’re a Safari user, either on desktop or iOS, it may be time to change browsers, at least temporarily. More flaws have been uncovered in Safari’s tracking prevention system. In this case, a bug within Safari 15 means that any website... Read more...
If you're reading this, you probably don't need to be told that a "bug bounty" is a cash prize paid to security researchers that find a software exploit. Non-USians might need to be told that "DHS" refers to the United States Department of... Read more...
Prev 1 2 3 4 5 Next