Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Time and again, United States government officials and agencies have warned that Huawei and other Chinese telecommunication companies pose a security threat, due to spying concerns. Huawei has repeatedly denied being in bed with China's... Read more...
In what could pass for a scene in a movie, a hacker managed to breach a school district's database and steal 10 years worth of personal data belonging to half a million students and staff. Only this wasn't a movie, it happened in real... Read more...
A group of hackers claims to have a service that will allow anyone willing to spend $250 to send out a "marketing" campaign that can reach "every single printer in the world." The people are offering to sell advertisers a spot in "the most... Read more...
Back in early April, Hewlett-Packed launched a revamped ZBook family of professional notebooks and convertibles available with Intel 8th generation Core and Xeon processors along with NVIDIA Quadro graphics. Today, HP has announced... Read more...
At least for the time being, it looks like the mad rush to buy graphics cards for cryptocurrency mining and leave gamers with overpriced options is in the rear view mirror. That doesn't mean cryptocurrency mining doesn't still present an... Read more...
One of the things Microsoft has been pushing since Windows 8/8.1 is touchscreen operation. Hardware makers are on board too, which is why there are so many 2-in-1 and convertible devices mixing it up with traditional clam shell laptops... Read more...
Smart speakers are growing in popularity, but in addition to providing a level of convenience to home consumers, they can potentially act as another point of entry for hackers and cyber criminals. To demonstrate this, researchers Wu Huiyu... Read more...
Bug Bounty programs are very common today with most of the big tech firms hosing them. The goal is to get hackers to report any bugs they find for a payday rather than turning to the black market to sell their hacks. HP has announced a new... Read more...
Hauwei is far and away best known for its smartphones and, to some extent, it's line of laptops like the Matebook X Pro. However, it also manufacturers routers and gateways, and one of its older models, the HG532, contains a vulnerability... Read more...
HP's EliteBook series laptops launched back in 2008 to general success, and a decade later it remains one of HP's top-selling thin and light laptop lines. To celebrate 10 years of that success, the company decided to completely redesigned... Read more...
Have you ever used the same password for multiple accounts? Maybe it's not particularly secure, either, because the really good ones are harder to remember—and no, 'monalisa' is not a secure password. Most will agree that password... Read more...
Multiple Gmail users awoke Sunday morning to find that a bunch of spam that appeared to be sent from their accounts. The spam messages from their accounts were found in the sent items folder, but these weren’t emails that the users had... Read more...
Huawei might be one of the largest smartphone OEMs in the world, but the company is having a very hard time breaking into the U.S. market. The reason for the difficulty is that Huawei has very close ties to the Chinese government, and the... Read more...
Users of the popular CCleaner program by Piriform are being advised to update the application after researchers at Cisco's Talos division discovered hackers had hidden malware inside. The contaminated utility served as a beacon call for... Read more...
We enthusiasts might boast about Core X-Series processors from Intel or Ryzen Threadripper chips from AMD; but for the professional workstation market, Intel's Xeon family of products have been laying waste to the competition for years... Read more...
A team of researchers from Positive Technologies have dug into the innards of Intel Management Engine (ME) 11 and have found a way to turn the feature off. If you aren't familiar with ME, it's a separate processor that is tucked away... Read more...
If there's one thing that's been made abundantly clear over the past couple of years, it's that if you dabble in cryptocurrency, you really need to do your homework and due diligence to make sure you don't wind up on the opposite end of an... Read more...
A freelance security consultant and Handler at SANS Internet Storm Center has discovered a rather interesting exploit in Microsoft Word, one that allows an attacker to abuse the productivity program's ability to auto-update links. This is... Read more...
Catering to the creative professional, HP today unveiled both a gorgeous new Cinema 4K display, as well as a slew of mobile workstations - all of which are certifiably HOT. At the forefront, HP's DreamColor Z31x Studio Display is a... Read more...
As our world becomes increasingly connected, the risk of exploitation continues to rise. Last October, we wrote of an issue that could become an all-too-common occurrence in the future: exploitation of our emergency systems. A hot topic... Read more...
Bitcoin seems to be the currency of choice when it comes to demanding ransoms, and that is because culprits demanding payment can hide behind a pseudonym (Bitcoin itself is not actually anonymous). So it is no surprise that a hacking... Read more...
Don’t be fooled by the form factor and your initial impressions -- what we have before us is not a typical smartphone. Well, technically we suppose it is, but the experience is not intended to replace your commonplace iPhone, Galaxy S, or... Read more...
First ... Prev 4 5 6 7 8 Next