Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Ring has faced challenges of late with hackers taking over accounts, among other things. Ring responded earlier this week to questions that five senators had sent to the company in the form of a letter about measures that it is taking to secure its line of video recording devices. The measures the company planned to... Read more...
A company that develops digital forensics tools for businesses and law enforcement specialists has found a way to hack into locked Apple iPhone devices running the latest version of iOS. The method is said to work on most iPhone models, from the iPhone 5s through the iPhone X, and is effective on iOS 12 through iOS... Read more...
If you use LastPass to manage your passwords, be advised that a recent update fixed a security issue that could allow an attacker to steal your login credentials. The issue is resolved in LastPass 4.33.0. However, if you do not have LastPass configured to update automatically, it is advised that you manually patch it... Read more...
An auction for a netbook model from 2008 that is running Windows XP SP3 has fetched more than $1.3 million from its final bid, with the buyer owning quite possibly the most expensive laptop in the world. Why did it sell for so much? It contains half a dozen malware samples that have collectively caused over $95... Read more...
LG is gearing up for a big MWC 2019 showing and is already teasing its flagship device that will be unveiled at the show. LG has in the past teased a device using a Snapdragon 855 SoC and packing a 5G modem for the show, but it's unclear if that device is the G8 ThinQ. LG has now announced that it has teamed up with... Read more...
A newly discovered security vulnerability in modern Intel X86 processors has been revealed that affects the processor's speculative execution technology – like Spectre and Meltdown – and can be used to access sensitive information, including encryption related data. Over the last day or two, patches have quietly... Read more...
Sometimes it feels like security and privacy are myths in this day and age of data leaks, hacking, and everything else. The latest example comes from a LocationSmart, a relatively obscure (to the public) location-as-a-service outfit has been leaking real-time location information of cell phone users on all of the... Read more...
Chip-level bugs Meltdown and Spectre continue to land chip-maker Intel in hot water. What do you do when every single chip you’ve produced since 1995 is now facing two of the most pervasive bugs your company has possibly ever experienced? Linux creator Linus Torvald brazenly suggests, honesty and complete candid... Read more...
Late last year a hack was perpetrated on what is called a "partner organization" that worked with the Australian Signals Directorate (ASD). The unnamed organization notified the ASD that it was hacked in November of 2016, and that outside parties gained access to its network. The small organization has only 50... Read more...
TrendMicro has published a report that claims that a "sizable" spam campaign is underway and other than just having a bunch of unwanted email to contend with, the spam campaign is also pushing ransomware. The spam campaign is said to be distributing the latest variant of Locky, which is the ransomware that invaded... Read more...
Lenovo is pitching the emerging interest in virtual reality as a reason for developers to consider its new ThinkStation P320 workstations. The world's top PC maker (in terms of market share) used Develop3D Live as the launchpad for its new systems, which featured Intel Xeon and 7th generation Core i3/i5/i7 (Kaby Lake)... Read more...
Large scale distributed denial of service (DDoS) attacks powered by thousands and sometimes millions of Internet of Things (IoT) devices that have been turned into a massive botnet is something that content delivery networks (CDNs) and service providers must be prepared for in 2017. Lest anyone thinks otherwise, yet... Read more...
Lenovo has done a remarkable job of classing up its business notebooks without sacrificing the features and build-quality that make the ThinkPad line so popular with road warriors. It recently updated its ThinkPad X1 Yoga with an excellent 2560x1440 OLED panel, for example, making it even more attractive to... Read more...
Today's a bad day security. First it was discovered that Microsoft accidentally leaked what amounts to a golden key for Secure Boot system, and now we find out there's a rather serious vulnerability in the TCP implementation in all Linux systems since version 3.6 of the Linux kernel was deployed four years ago. Is... Read more...
The market for dedicated tablets based on mobile operating systems such as Android and iOS is in decline, but the same can't be said for 2-in-1 detachable Windows PCs. These hybrid tablet/laptop systems offer an additional level of utility that standalone tablets don't provide, and best of all, they don't force consumers on a budget to choose... Read more...
If you haven't changed your LinkedIn password in several years, now would be a good time to get on that. Not only is it good practice to change passwords much more frequently than that, there's a chance that your login details were compromised four years ago and are just now being shopped around in an underground... Read more...
At a time when laptop makers are shunning big and bulky notebooks in favor of thin and light designs, Lenovo went a different direction with its ThinkPad P70, a mobile workstation brimming with high-end hardware for tackling rough and tumble tasks in the field. It's all about finding the right tool for the job, and... Read more...
Apple would have you believe that it's iPhone devices are locked down tighter than Fort Knox, that its encryption and security schemes are so well implemented that even its own engineers would have trouble hacking a handset. But is that really the case? In a murder investigation involving an actor from The Shield, the... Read more...
It looks as though the folks at Lian-Li took the term desktop computer a bit too literally with their new DK-04 system, which is literally a desk that doubles as an enclosure for your PC components. The DK-04 has a clean, industrial design and even has an electrically actuated height adjustment system that than can... Read more...
Shortly after we published our AC3200 router roundup, Linksys contacted us and wanted to throw one of its routers into the ring. We agreed, and the company sent us its Linksys EA9200 Tri-band Smart Wi-Fi router, which like the others in the roundup is a tri-band router that uses the Broadcom XStream 5GHz platform, throwing out dual 5GHz networks... Read more...
When acquiring a new notebook or desktop, one of the first things many power users do is wipe it clean. No one likes the "junk" that comes preinstalled, and if time is available, sometimes it's just preferable to start fresh. But what if that was easier said than done? What if that preinstalled junk became more like a... Read more...
A teenage member of the notorious hacking group Lizard Squad has received a two-year suspended sentence for numerous cyber crimes. All tallied, he was convicted of 50,700 charges related to computer crimes, and in addition to his two-year suspended sentence, he must also undergo monitoring of his online activities. He... Read more...
Prev 1 2 3 4 Next