Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Hidden cameras in a private space, such as a bedroom or bathroom in an unfamiliar place like an Airbnb or other rental property, are a nightmare for most people. However, hacker and cybersecurity researcher Marcus Hutchins, better known as MalwareTech, posted a short video to TikTok explaining how to detect hidden... Read more...
Security researchers have discovered a side-channel vulnerability in a similar vein to Meltdown, except this one is present in AMD's processors. AMD confirmed the finding, and has offered guidance to software developers, saying they should take precautions to avoid leaving the security hole open to attackers... Read more...
Following call center company Teleperformance allegedly forcing employees to undergo AI camera surveillance, Amazon wants to monitor its own customer service employees. Soon, Amazon could use a system that captures all workers' keystrokes to run behavioral analysis and prevent malicious hackers or imposters from... Read more...
Yesterday, criminal hackers stole approximately $600 million in varying cryptocurrencies from the PolyNetwork, a blockchain interoperability company. Now, in an interesting turn of events, the hackers have begun returning the stolen funds in what was to be one of the biggest cryptocurrency thefts ever. As it stands... Read more...
Which do you prefer when browsing the web—raw speed or a combination of security and privacy? Generally speaking, modern browsers deliver the whole kit and caboodle, which is the way it should be. That said, Microsoft is testing a new "Super Duper Secure Mode" for its Edge browser that puts more of an emphasis on the... Read more...
If you want to be stealthy, perhaps not wearing a hot pink suit is a good choice. When it comes to cybersecurity, avoiding computer languages that people have come to know and recognize is a good idea as well. Threat actors have seemingly figured out the latter as some malware has now been built using “exotic”... Read more...
Mobile workstations come in all shapes and sizes. Recently we took a look at the HP ZBook Fury 15 G7, a powerful mobile workstation with ISV-certified drivers that could replace many desktops, but in a more portable form factor. Many engineers need the type of power and reliability offered by a machine the size of the ZBook Fury 15 G7,... Read more...
Earlier this year, a vulnerability within Apple’s WebKit for Safari was discovered by Google’s Threat Analysis Group (TAG) and then tracked as CVE-2021-1879. Now, it is reported that this vulnerability was likely exploited by a familiar Russian government-backed threat actor: Nobelium. Yesterday, Google TAG... Read more...
On July 4th, we reported that the developing Kaseya ransomware incident might be much worse than initially thought. While it is still unclear exactly how many victims and encrypted devices there are, it was apparent that this is certainly a wide-reaching international incident. We also noted that REvil, the... Read more...
Hacking group REvil, which was behind attacks such as those on Acer in early 2021, has returned in force evidently, after approximately 200 U.S. businesses were hit by ransomware overnight. It has been found that the ransomware spread through software created by Florida-based IT company Kaseya in what is another... Read more...
Over the past two weeks, Colonial Pipeline has been battling a ransomware attack that crippled fuel flow to the eastern seaboard. This was supposedly not intended to be as catastrophic as it was, but the hacking group behind the attack, DarkSide, has quite a bit of experience in ransomware. The group has reportedly... Read more...
Dell is one of the most popular PC brands globally, selling millions of laptops, desktops, and server systems to everyday consumers and businesses alike each year. However, SentinelLabs researchers warned this week that five critical security flaws have been lurking in its firmware update driver since the early days... Read more...
Normally when people think of "business-class laptops" they envision moderately powerful systems that handle office productivity tasks and web browsing duties with plenty of performance to keep employees productive, but without frivolous cost-adding features. On the flip side, workstations conjure images of tremendously powerful beasts with... Read more...
It was recently revealed that the personal information of roughly 533 million Facebook users was leaked in August 2019. Unfortunately, Facebook has not provided a way to check if your personal information was compromised and has not stated whether it intends to do so in the future. However, there are a few third-party... Read more...
Over the last couple of weeks, hackers have been out in force, breaking into Microsoft Exchange and other services. Now, a group of international hackers who view themselves as vigilantes have breached Silicon Valley-startup Verkada Inc. This gave the hackers access to the live feeds of 150,000 surveillance cameras... Read more...
Some of the United State’s most critical infrastructure are incredibly vulnerable to attack, as we are now finding out. Last Friday, a plant operator at a water treatment facility in Oldsmar, Florida, noticed his mouse dashing around on the screen. The operator did not think much of it then, but when it happened a... Read more...
Samsung has long dreamed of the modern smartphone extending its usefulness to more PC-like use cases, such as functions you might otherwise drive on a desktop or laptop. To that end, the company has poured resources into DeX, a Chrome OS-like interface that works remarkably well with a traditional keyboard and mouse... Read more...
Facebook is approaching 3 billion monthly active users (up from 2 billion in 2017), which is more than the combined population of China (~1.4 billion), the United States (~331 million), and the United Kingdom (~68 billion), to put that figure into perspective. Its massive footprint in the social media space... Read more...
Most devices that require some form of authentication leverage a username and password combination, a security measure that has been place since the dawn of time (well, maybe not quite that long, but still a long time). But there are problems with passwords. Weak ones are easy to crack, and tough ones are difficult to... Read more...
There is a hacking campaign to disrupt this year's presidential election in the United States, according to a warning issued by the Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA). Hackers are chaining Windows and virtual private network (VPN) exploits to carry out... Read more...
Earlier in the week, we reported on a dangerous exploit with Windows domain controllers called Zerologon. Now, the Cybersecurity and Infrastructure Security Agency (CISA), under the Department of Homeland Security direction, is issuing warnings about the exploit and is pushing government agencies to patch the... Read more...
Imagine this—you're having a good day, your PC is running smoothly, and you decide to install a custom Windows 10 theme, but then all of a sudden things go wrong. Very wrong. As in, you find out your Microsoft account has been compromised, but how can that be? Well, it might have been that custom Windows theme you... Read more...
First ... Prev 2 3 4 5 6 Next