Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

A hacker group called ShinyHunters claims to have breached the databases of ten companies operating around the world, and stolen user data on millions of people. Currently, the databases for the ten companies are being offered for sale on the dark web with a total of 73.2 million user records. The same group of... Read more...
There is some more bad news for Zoom and some of its users. Security researchers recently discovered that the dark web and hacker forums are host to over 500,000 compromised Zoom accounts being offered up for sale at dirt cheap prices. Some of them are being sold for a fraction of a penny, while others are being given... Read more...
A security researcher who discovered a over half a dozen zero-day vulnerabilities in the Safari browser has lined his pockets with $75,000, courtesy of Apple's bug bounty program. Left unaddressed, a few of the vulnerabilities could allow an attacker to hijack the webcam on Mac systems, as well as iPhone and iPad... Read more...
Malicious actors who make it their business to spread malware obviously have no scruples about preying on on people in any manner possible, but sometimes they fall to new lows. We saw when it when hackers attempted to assault epilepsy patients by posting flashing animations to the Epilepsy Foundation's support forum... Read more...
We fully realize we are preaching to the choir, but never open up unsolicited and/or unexpected email attachments. Remind your friends and remind your family members. Lest anyone need a reminder of why this is a bad idea, security researchers are warning of a group of attackers who have been phishing for victims as... Read more...
Hackers need physical access to a computer or need to trick a user into installing malware to steal data from an air-gapped PC (one that is not physically connected to a network). Air-gapped computers can have malware installed to steal data, but getting the data out is harder. That may not be the case with new... Read more...
Here we go again, the United States Federal Bureau of Investigation (FBI) is exerting pressure on Apple to help unlock an older iPhone model as part of a crime investigation, and just like before, there's another layer to the story. On the surface, it might seem reasonable to pressure a device maker to thwart its own... Read more...
Wyze learned on December 26 that it had suffered a major data breach that leaked some user data. The amount of data that was allegedly leaked was concerning for users, with reports suggesting that details on over 2 million accounts were accessible. Wyze says that it moved to lock down the database that was allegedly... Read more...
Did you know that you could create and use a QR code to better facilitate using stronger security on your wireless network? A QR code is not in and of itself more secure than manually typing in a passcode, but if you want to use a long string of 63 characters and symbols, you would otherwise need an exceptional... Read more...
The modern work place is everywhere. Thanks to the need to attract top talent, many employers have lenient work from home policies that allow many employees who would normally be in an office to work from almost anywhere. Without the advent of fast portable PCs to do that work, however, this wouldn't be as easy as folding up a laptop and taking... Read more...
Earlier this week, we brought you news that Facebook had yet another epic privacy fail after information pertaining to hundreds of millions of users was found on an external server. The server was fully exposed and publicly accessible, leaving roughly 420,000 million Facebook IDs and their associated phone numbers... Read more...
Security researchers have discovered it is possible to hack a digital SLR camera with Wi-Fi capabilities (fast becoming a common feature in modern DSLR cameras) to install ransomware, thereby hijacking a user's photographs. Just as it happens on a PC, the photos would be encrypted, with the attacker threatening to... Read more...
The National Security Agency (NSA) has a program in place called Upstream that taps directly into the Internet backbone to search traffic. The agency has claimed in the past that the warrantless searches of email are allowed under Section 702 enacted as part of the FISA Amendments Act. The agency made changes in 2017... Read more...
Time and again, United States government officials and agencies have warned that Huawei and other Chinese telecommunication companies pose a security threat, due to spying concerns. Huawei has repeatedly denied being in bed with China's government, so to speak. Its founder recently doubled down on the company's denial... Read more...
In what could pass for a scene in a movie, a hacker managed to breach a school district's database and steal 10 years worth of personal data belonging to half a million students and staff. Only this wasn't a movie, it happened in real life. Had it been a movie, the hacker would likely have been revealed to be a... Read more...
A group of hackers claims to have a service that will allow anyone willing to spend $250 to send out a "marketing" campaign that can reach "every single printer in the world." The people are offering to sell advertisers a spot in "the most viral ad campaign in history" according to the advertisement for the... Read more...
Back in early April, Hewlett-Packed launched a revamped ZBook family of professional notebooks and convertibles available with Intel 8th generation Core and Xeon processors along with NVIDIA Quadro graphics. Today, HP has announced higher-performing versions of the ZBook Studio, ZBook Studio x360, ZBook 15a and ZBook... Read more...
At least for the time being, it looks like the mad rush to buy graphics cards for cryptocurrency mining and leave gamers with overpriced options is in the rear view mirror. That doesn't mean cryptocurrency mining doesn't still present an annoyance in some sectors, though. Security researchers warn that cryptocurrency... Read more...
One of the things Microsoft has been pushing since Windows 8/8.1 is touchscreen operation. Hardware makers are on board too, which is why there are so many 2-in-1 and convertible devices mixing it up with traditional clam shell laptops. But is there a security trade off? At least one researcher thinks so after... Read more...
Smart speakers are growing in popularity, but in addition to providing a level of convenience to home consumers, they can potentially act as another point of entry for hackers and cyber criminals. To demonstrate this, researchers Wu Huiyu and Qian Wenxiang demonstrated at DefCon 2018 a technique for hacking Amazon's... Read more...
Bug Bounty programs are very common today with most of the big tech firms hosing them. The goal is to get hackers to report any bugs they find for a payday rather than turning to the black market to sell their hacks. HP has announced a new Bug Bounty program to lure researchers in to hack its printer software. The... Read more...
Hauwei is far and away best known for its smartphones and, to some extent, it's line of laptops like the Matebook X Pro. However, it also manufacturers routers and gateways, and one of its older models, the HG532, contains a vulnerability that a malware author exploited to create a fairly large botnet. What's... Read more...
First ... Prev 3 4 5 6 7 Next