Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Imagine this—you're having a good day, your PC is running smoothly, and you decide to install a custom Windows 10 theme, but then all of a sudden things go wrong. Very wrong. As in, you find out your Microsoft account has been compromised, but how can that be? Well, it might have been that custom Windows theme you... Read more...
Intel has been going through a bit of rough patch over the past few weeks, following the disclosure that its 7nm products have been delayed, which led to an internal reorganization that resulted in the company's chief engineering officer departing the company. Now we're learning that Intel was also the victim of a... Read more...
Microsoft has made available a pair of out-of-band security patches for Windows 10, one of which is labeled as "critical" and the other as "important." Under normal circumstances, security patches get doled out on the second Tuesday of every month, otherwise known as Patch Tuesday. But in this case, Microsoft decided... Read more...
Amazon has earned itself some well-deserved bragging rights for putting a stop to what ranks as the largest distributed denial of service (DDoS) attack ever, and by quite a bit. According to data divulged by Amazon, it halted a DDoS attack that peaked with a "previously unseen volume" of 2.3 terabits per second in... Read more...
A hacker group called ShinyHunters claims to have breached the databases of ten companies operating around the world, and stolen user data on millions of people. Currently, the databases for the ten companies are being offered for sale on the dark web with a total of 73.2 million user records. The same group of... Read more...
There is some more bad news for Zoom and some of its users. Security researchers recently discovered that the dark web and hacker forums are host to over 500,000 compromised Zoom accounts being offered up for sale at dirt cheap prices. Some of them are being sold for a fraction of a penny, while others are being given... Read more...
A security researcher who discovered a over half a dozen zero-day vulnerabilities in the Safari browser has lined his pockets with $75,000, courtesy of Apple's bug bounty program. Left unaddressed, a few of the vulnerabilities could allow an attacker to hijack the webcam on Mac systems, as well as iPhone and iPad... Read more...
Malicious actors who make it their business to spread malware obviously have no scruples about preying on on people in any manner possible, but sometimes they fall to new lows. We saw when it when hackers attempted to assault epilepsy patients by posting flashing animations to the Epilepsy Foundation's support forum... Read more...
We fully realize we are preaching to the choir, but never open up unsolicited and/or unexpected email attachments. Remind your friends and remind your family members. Lest anyone need a reminder of why this is a bad idea, security researchers are warning of a group of attackers who have been phishing for victims as... Read more...
Hackers need physical access to a computer or need to trick a user into installing malware to steal data from an air-gapped PC (one that is not physically connected to a network). Air-gapped computers can have malware installed to steal data, but getting the data out is harder. That may not be the case with new... Read more...
Here we go again, the United States Federal Bureau of Investigation (FBI) is exerting pressure on Apple to help unlock an older iPhone model as part of a crime investigation, and just like before, there's another layer to the story. On the surface, it might seem reasonable to pressure a device maker to thwart its own... Read more...
Wyze learned on December 26 that it had suffered a major data breach that leaked some user data. The amount of data that was allegedly leaked was concerning for users, with reports suggesting that details on over 2 million accounts were accessible. Wyze says that it moved to lock down the database that was allegedly... Read more...
Did you know that you could create and use a QR code to better facilitate using stronger security on your wireless network? A QR code is not in and of itself more secure than manually typing in a passcode, but if you want to use a long string of 63 characters and symbols, you would otherwise need an exceptional... Read more...
The modern work place is everywhere. Thanks to the need to attract top talent, many employers have lenient work from home policies that allow many employees who would normally be in an office to work from almost anywhere. Without the advent of fast portable PCs to do that work, however, this wouldn't be as easy as folding up a laptop and taking... Read more...
Earlier this week, we brought you news that Facebook had yet another epic privacy fail after information pertaining to hundreds of millions of users was found on an external server. The server was fully exposed and publicly accessible, leaving roughly 420,000 million Facebook IDs and their associated phone numbers... Read more...
Security researchers have discovered it is possible to hack a digital SLR camera with Wi-Fi capabilities (fast becoming a common feature in modern DSLR cameras) to install ransomware, thereby hijacking a user's photographs. Just as it happens on a PC, the photos would be encrypted, with the attacker threatening to... Read more...
The National Security Agency (NSA) has a program in place called Upstream that taps directly into the Internet backbone to search traffic. The agency has claimed in the past that the warrantless searches of email are allowed under Section 702 enacted as part of the FISA Amendments Act. The agency made changes in 2017... Read more...
Time and again, United States government officials and agencies have warned that Huawei and other Chinese telecommunication companies pose a security threat, due to spying concerns. Huawei has repeatedly denied being in bed with China's government, so to speak. Its founder recently doubled down on the company's denial... Read more...
In what could pass for a scene in a movie, a hacker managed to breach a school district's database and steal 10 years worth of personal data belonging to half a million students and staff. Only this wasn't a movie, it happened in real life. Had it been a movie, the hacker would likely have been revealed to be a... Read more...
A group of hackers claims to have a service that will allow anyone willing to spend $250 to send out a "marketing" campaign that can reach "every single printer in the world." The people are offering to sell advertisers a spot in "the most viral ad campaign in history" according to the advertisement for the... Read more...
Back in early April, Hewlett-Packed launched a revamped ZBook family of professional notebooks and convertibles available with Intel 8th generation Core and Xeon processors along with NVIDIA Quadro graphics. Today, HP has announced higher-performing versions of the ZBook Studio, ZBook Studio x360, ZBook 15a and ZBook... Read more...
At least for the time being, it looks like the mad rush to buy graphics cards for cryptocurrency mining and leave gamers with overpriced options is in the rear view mirror. That doesn't mean cryptocurrency mining doesn't still present an annoyance in some sectors, though. Security researchers warn that cryptocurrency... Read more...
First ... Prev 3 4 5 6 7 Next