Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Life just got a little easier for iPhone thieves, though technically that's not the intended purpose of a new tool that helps iDevice owners bypass Apple's iCloud activation lock. Officially -- and we're not sure if that comes with a *wink* *wink* or if the developers are being sincere -- a tool called "doulCi" is... Read more...
A pair of healthcare organizations have agreed to pay a combined $4.8 million to settle charges that they potentially violated the Health Insurance Portability and Accountability Act of 1996 (otherwise known as HIPPA). The charges were the consequence of a data breach in which protected health information of thousands... Read more...
We’ve said it before, but it bears repeating as we enter the era of the Internet of Things (IoT): Anything that’s Internet-connected can be hacked. We’ve seen it recently with TRENDnet IP cameras and warned about it with Nest (even as Google snapped it up in a $3.2 billion acquisition this week). And now, a security company... Read more...
Earlier this month, we talked about the frustrating key-logger botnet call Pony, and it now appears that we couldn't make it through the rest of the month without having to discuss another. While the Pony botnet affected the PC, this latest one, dubbed Android.Spyware.MisoSMS by security firm FireEye, targets Android... Read more...
At the end of any given year, it's usually pretty easy to draw up a list of things that the past 12 months will go down in history for. While there are a number of things that could make 2013's list, on the technology side of things, privacy and security will undoubtedly be at the forefront of many people's minds... Read more...
Breaching the security of a website or Web service should be one of the most difficult tasks on earth, but given the fact that not a week can go by where we don't learn of some security issue at a major firm, it's clear that most of the Web is seriously lacking in setting up proper barriers. In recent months, Adobe... Read more...
If you're still rocking Windows XP, we admire your dedication and ability to squeeze over a decade of use out of an operating system you presumably purchased long ago (nobody pirates XP, right?), but the end is nigh if you care at all about security. Come April 2014, Microsoft will cease supporting the legacy OS, thereby leaving your system... Read more...
When Apple unveiled its iPhone 5C and 5S last week, one of the standout features belonged to the latter: Fingerprint security. In effect, instead of having to type in a quick password to gain access to your phone, the built-in fingerprint reader would allow you to press your thumb or finger against the phone's main... Read more...
Mainstream All-In-One PCs have become increasingly more popular in recent years, but AIO workstations remain a rare breed. After all, workstations typically require more horsepower than your average AIO, and IT folks demand better access to a computer’s internals than most ordinary AIOs allow. That makes HP’s Z1 workstation... Read more...
Getting hacked is a bummer and can leave you feeling violated, but we can only imagine what it's like to get hacked in the most sacred room of the house: the bathroom. For those who own a luxury Satis toilet controlled by an accompanying smartphone application, it's entirely possible to fall prey to a hacker attack while you're doing your... Read more...
One of Nintendo’s main fan sites, Club Nintendo, was reportedly the subject of nearly 24,000 illicit logins over the course of the last month, which led to cybercriminals possibly making off with people’s real names and personal information such as email addresses, physical addresses, and phone numbers. Club Nintendo lets users... Read more...
You may have noticed that RockBand.com, DanceCentral.com, and Creators.RockBand.com are all down. That's because Harmonix pulled the plug on each of the three websites in order to investigate what it believes is a hacker attack. As a precaution, Harmonix passwords have been disabled, and users who have accounts on any of the affected sites... Read more...
DDoSing a Web server has become the de facto way to exact revenge on someone, or some company. Not a week, or sometimes even a day, will go by when you can't read about some ongoing DDoS attack. We've seen them spawned by Internet goofs to professional criminals. DDoSing is easy, and it's effective. That's why it's so heavily-used.... Read more...
If there's one thing that goes hand-in-hand with technology, it's security flaws. Rarely, though, are such flaws actual features, such as one Apple just had to rush to patch up. Late last week, the company rolled-out two-step verification, where a pin code sent to your mobile phone could be used in conjunction with a... Read more...
The folks at Pwnie Express make some of the coolest penetration-testing products on the planet. Its most-popular offering has been the "Pwn Plug", an inconspicuous mini-PC that plugs into a wall socket and looks little different than a large power adapter. Then there's the "Power Pwn", a product sharing a similar idea, but offers additional... Read more...
It was only a matter of time before someone actually hacked the weather, but before you run outside in a panic and make a mad dash for your storm shelter, understand that your city's forecast remains unchanged, save for the typical unpredictability of it all. Hackers haven't gained control of the Sun or storm clouds... Read more...
Smartphones, tablets and computers are constantly consuming and creating more and more content. And with that comes massive amounts of data consumption. The amount of sharing that takes place on today's smartphones and tablets is astounding, and every instance of that requires data -- and storage. Lately, it seems as if companies are... Read more...
Solid State Drives are a fabulous way to boost a system's performance, but for all their strong points, they aren't an easy upgrade for a lot of people. Performance can vary significantly between manufacturers, only the most expensive drives can replace the need for an HDD in an enthusiast / data-heavy system, and reinstalling a full... Read more...
By any measure, end users are still using passwords that are far too simple. The Gawker Media hack from 2010, in fact, showed "123456" was the most common password in Gawker's database. Well, Microsoft's decided that if folks aren't going to pick strong passwords, at the very least Microsoft can keep them from picking the most egregious, easy... Read more...
You would have had to travel all the way to Budapest in order to attend "Hactivity 2010," the largest hackers' conference in Eastern and Central Europe. But for those of you who didn't make it -- which we're assuming is everyone reading this -- we've dug up one of the more interesting sound bites. "The Internet is the greatest generation gap... Read more...
In need of extra cash? Who isn't, right? If you're a smart hacker, you may be able to make a small fortune by simply tricking an ATM or two into spitting out money for you. We know that sounds crazy, and it certainly is, but it's true nonetheless. At the annual Black Hat conference -- where hackers and security... Read more...
It seems we can't go a month without talking about privacy concerns surrounding one of today's popular social networking sites. Whether it's a new Facebook setting or other security breach, keeping one's private information private isn't always easy. A recent poll by the Marist Institute for Public Opinion claims that half of all US residents... Read more...
First ... Prev 6 7 8 9 10 Next