Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Samsung has long dreamed of the modern smartphone extending its usefulness to more PC-like use cases, such as functions you might otherwise drive on a desktop or laptop. To that end, the company has poured resources into DeX, a Chrome... Read more...
Facebook is approaching 3 billion monthly active users (up from 2 billion in 2017), which is more than the combined population of China (~1.4 billion), the United States (~331 million), and the United Kingdom (~68 billion), to put that... Read more...
Most devices that require some form of authentication leverage a username and password combination, a security measure that has been place since the dawn of time (well, maybe not quite that long, but still a long time). But there are... Read more...
There is a hacking campaign to disrupt this year's presidential election in the United States, according to a warning issued by the Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA). Hackers... Read more...
Earlier in the week, we reported on a dangerous exploit with Windows domain controllers called Zerologon. Now, the Cybersecurity and Infrastructure Security Agency (CISA), under the Department of Homeland Security direction, is issuing... Read more...
Imagine this—you're having a good day, your PC is running smoothly, and you decide to install a custom Windows 10 theme, but then all of a sudden things go wrong. Very wrong. As in, you find out your Microsoft account has been compromised... Read more...
Intel has been going through a bit of rough patch over the past few weeks, following the disclosure that its 7nm products have been delayed, which led to an internal reorganization that resulted in the company's chief engineering officer... Read more...
Microsoft has made available a pair of out-of-band security patches for Windows 10, one of which is labeled as "critical" and the other as "important." Under normal circumstances, security patches get doled out on the second Tuesday of... Read more...
Amazon has earned itself some well-deserved bragging rights for putting a stop to what ranks as the largest distributed denial of service (DDoS) attack ever, and by quite a bit. According to data divulged by Amazon, it halted a DDoS attack... Read more...
A hacker group called ShinyHunters claims to have breached the databases of ten companies operating around the world, and stolen user data on millions of people. Currently, the databases for the ten companies are being offered for sale on... Read more...
There is some more bad news for Zoom and some of its users. Security researchers recently discovered that the dark web and hacker forums are host to over 500,000 compromised Zoom accounts being offered up for sale at dirt cheap prices... Read more...
A security researcher who discovered a over half a dozen zero-day vulnerabilities in the Safari browser has lined his pockets with $75,000, courtesy of Apple's bug bounty program. Left unaddressed, a few of the vulnerabilities could allow... Read more...
Malicious actors who make it their business to spread malware obviously have no scruples about preying on on people in any manner possible, but sometimes they fall to new lows. We saw when it when hackers attempted to assault epilepsy... Read more...
We fully realize we are preaching to the choir, but never open up unsolicited and/or unexpected email attachments. Remind your friends and remind your family members. Lest anyone need a reminder of why this is a bad idea, security... Read more...
Hackers need physical access to a computer or need to trick a user into installing malware to steal data from an air-gapped PC (one that is not physically connected to a network). Air-gapped computers can have malware installed to steal... Read more...
Here we go again, the United States Federal Bureau of Investigation (FBI) is exerting pressure on Apple to help unlock an older iPhone model as part of a crime investigation, and just like before, there's another layer to the story. On the... Read more...
Wyze learned on December 26 that it had suffered a major data breach that leaked some user data. The amount of data that was allegedly leaked was concerning for users, with reports suggesting that details on over 2 million accounts were... Read more...
Did you know that you could create and use a QR code to better facilitate using stronger security on your wireless network? A QR code is not in and of itself more secure than manually typing in a passcode, but if you want to use a long... Read more...
The modern work place is everywhere. Thanks to the need to attract top talent, many employers have lenient work from home policies that allow many employees who would normally be in an office to work from almost anywhere. Without the advent of fast portable PCs to do that work, however, this... Read more...
Earlier this week, we brought you news that Facebook had yet another epic privacy fail after information pertaining to hundreds of millions of users was found on an external server. The server was fully exposed and publicly accessible... Read more...
Security researchers have discovered it is possible to hack a digital SLR camera with Wi-Fi capabilities (fast becoming a common feature in modern DSLR cameras) to install ransomware, thereby hijacking a user's photographs. Just as it... Read more...
The National Security Agency (NSA) has a program in place called Upstream that taps directly into the Internet backbone to search traffic. The agency has claimed in the past that the warrantless searches of email are allowed under Section... Read more...
First ... Prev 3 4 5 6 7 Next