Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Back in early April, Hewlett-Packed launched a revamped ZBook family of professional notebooks and convertibles available with Intel 8th generation Core and Xeon processors along with NVIDIA Quadro graphics. Today, HP has announced higher-performing versions of the ZBook Studio, ZBook Studio x360, ZBook 15a and ZBook... Read more...
At least for the time being, it looks like the mad rush to buy graphics cards for cryptocurrency mining and leave gamers with overpriced options is in the rear view mirror. That doesn't mean cryptocurrency mining doesn't still present an annoyance in some sectors, though. Security researchers warn that cryptocurrency... Read more...
One of the things Microsoft has been pushing since Windows 8/8.1 is touchscreen operation. Hardware makers are on board too, which is why there are so many 2-in-1 and convertible devices mixing it up with traditional clam shell laptops. But is there a security trade off? At least one researcher thinks so after... Read more...
Smart speakers are growing in popularity, but in addition to providing a level of convenience to home consumers, they can potentially act as another point of entry for hackers and cyber criminals. To demonstrate this, researchers Wu Huiyu and Qian Wenxiang demonstrated at DefCon 2018 a technique for hacking Amazon's... Read more...
Bug Bounty programs are very common today with most of the big tech firms hosing them. The goal is to get hackers to report any bugs they find for a payday rather than turning to the black market to sell their hacks. HP has announced a new Bug Bounty program to lure researchers in to hack its printer software. The... Read more...
Hauwei is far and away best known for its smartphones and, to some extent, it's line of laptops like the Matebook X Pro. However, it also manufacturers routers and gateways, and one of its older models, the HG532, contains a vulnerability that a malware author exploited to create a fairly large botnet. What's... Read more...
HP's EliteBook series laptops launched back in 2008 to general success, and a decade later it remains one of HP's top-selling thin and light laptop lines. To celebrate 10 years of that success, the company decided to completely redesigned their business class powerhouse notebook to cater to today's changing workforce... Read more...
Have you ever used the same password for multiple accounts? Maybe it's not particularly secure, either, because the really good ones are harder to remember—and no, 'monalisa' is not a secure password. Most will agree that password management is a pain in the backside, and if you wish there was a better way, well... Read more...
Multiple Gmail users awoke Sunday morning to find that a bunch of spam that appeared to be sent from their accounts. The spam messages from their accounts were found in the sent items folder, but these weren’t emails that the users had sent themselves leaving many to think their accounts had been hacked. One user... Read more...
Huawei might be one of the largest smartphone OEMs in the world, but the company is having a very hard time breaking into the U.S. market. The reason for the difficulty is that Huawei has very close ties to the Chinese government, and the U.S. government is balking over fears of spying that could compromise national... Read more...
Users of the popular CCleaner program by Piriform are being advised to update the application after researchers at Cisco's Talos division discovered hackers had hidden malware inside. The contaminated utility served as a beacon call for additional forms of malware—using a backdoor, an attacker could run code from a... Read more...
We enthusiasts might boast about Core X-Series processors from Intel or Ryzen Threadripper chips from AMD; but for the professional workstation market, Intel's Xeon family of products have been laying waste to the competition for years. Hewlett-Packard is embracing the expanded Xeon family with its latest "Z"... Read more...
A team of researchers from Positive Technologies have dug into the innards of Intel Management Engine (ME) 11 and have found a way to turn the feature off. If you aren't familiar with ME, it's a separate processor that is tucked away inside Intel CPUs that allows companies to manage the computers on their networks... Read more...
If there's one thing that's been made abundantly clear over the past couple of years, it's that if you dabble in cryptocurrency, you really need to do your homework and due diligence to make sure you don't wind up on the opposite end of an attack, or scam. Some Ethereum owners are learning this lesson the hard way... Read more...
A freelance security consultant and Handler at SANS Internet Storm Center has discovered a rather interesting exploit in Microsoft Word, one that allows an attacker to abuse the productivity program's ability to auto-update links. This is a feature that is enabled by default—when you add links to external sources like... Read more...
Catering to the creative professional, HP today unveiled both a gorgeous new Cinema 4K display, as well as a slew of mobile workstations - all of which are certifiably HOT. At the forefront, HP's DreamColor Z31x Studio Display is a 31.1" display equipped with a proper Cinema 4K resolution (4096x2160) and a ton of... Read more...
As our world becomes increasingly connected, the risk of exploitation continues to rise. Last October, we wrote of an issue that could become an all-too-common occurrence in the future: exploitation of our emergency systems. A hot topic in recent years has been exploiting mobile emergency alert systems, which... Read more...
Bitcoin seems to be the currency of choice when it comes to demanding ransoms, and that is because culprits demanding payment can hide behind a pseudonym (Bitcoin itself is not actually anonymous). So it is no surprise that a hacking organization has instructed Apple to fork over a Bitcoin ransom in exchange for not... Read more...
Don’t be fooled by the form factor and your initial impressions -- what we have before us is not a typical smartphone. Well, technically we suppose it is, but the experience is not intended to replace your commonplace iPhone, Galaxy S, or other handset. In fact, you should not even consider running to your nearest... Read more...
President Donald Trump turned in his much-used Android phone for something more secure (likely a modified Blackberry or iPhone handset), but in case it has not been made clear to this point, he has no intention of giving up Twitter. Trump is the first United States president to tap into social media to the extent that... Read more...
As we've discussed multiple times before here at HotHardware, IoT device makers have largely been unconcerned about security up until this point, which means that way too many devices in use out there in the wild are sitting there unsecured. Samsung's Smartcam is one such device. After Smartcam's launch, hackers... Read more...
As if hackers do not already have an easy enough time duping Internet users into forking over personal information, it turns out that browser autofill profiles may be helping them out when they're supposed to be making things more convenient for the person who inputted his information. By implementing hidden fields on... Read more...
First ... Prev 4 5 6 7 8 Next