Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Jan Souček, a security researcher from Prague, has uncovered a vulnerability in the security of the iOS Mail application that nefarious types can deploy against users of the app to gain access to their iCloud passwords. The method published by Souček illustrates how an email can be sent to the hapless victim that... Read more...
If you own an LG ultrawide display and installed its included split screen software, you should take note. According to a user report, installing this software will disable the User Account Control security feature in Windows without your consent. You're not even bound to notice right away because of its... Read more...
Lenovo said it's currently investigating a cyberattack that took the company's website down for several hours earlier this week, though it may not have to look very far. The ornery hacking group known as Lizard Squad is claiming responsibility for the security breach, purportedly as punishment for the recent Superfish... Read more...
Lenovo had a rough go of it over the past few weeks. First, news broke that Lenovo had installed Superfish (widely regarded as adware) on some of its notebooks. As public outcry mounted, Lenovo offered a public apology and provided customers with instructions for removing Superfish. But all the negative publicity... Read more...
What a week it has been for Lenovo. Often considered one of the best of the notebook vendors, it was discovered earlier this week that the company in recent months had been bundling some seriously shady software on many of the PCs it sold to consumers. Not only did this software inject advertising into user Web... Read more...
Purchasing a new laptop can sometimes be a chore. For starters, simply finding one that's "right for you" takes time and effort, and once you do find it, you know that the "chore" part isn't over. Once you get that baby home, you'll have to begin mentally preparing yourself for the inevitable bloatware... Read more...
Buried in the details of Microsoft's technical preview for Windows 10 (look for our own discussion in short order), is a bit of a footnote concerning the operating system's requirements. I say footnote because this news -- that Windows 10 will have exactly the same requirements as Windows 8.1, which had the same... Read more...
Microsoft is scrambling to fix a security flaw in its Internet Explorer (IE) browser that could allow a hacker to remotely execute malicious code if users visit an infected website. Unfortunately, the security bug is present on just about every version of IE, and if you're a Windows XP user, be advised that no... Read more...
Believe it or not, malware for Android exists, and the best way to avoid it is by only downloading apps from trusted sources, such as Google Play. That said, you're still not immune to threats, and according to security firm Avast, makers of self-titled antivirus software, the newest threat to the Android platform is... Read more...
Making money while running a social media service is difficult. Companies like Facebook and Twitter have struggled to monetize their platforms on both desktop and mobile, while striking balances that don't royally tick off users with obnoxious advertising. But in a world where dubious advertising and branding... Read more...
Information about the NSA's data gathering efforts continues, with newly-released information of the agency's efforts on the social networking front. It's already been revealed that the NSA gathers information from many different sources, but this latest information gives us a clear idea as to the extent that this... Read more...
While perhaps a bit unnerving, let's not act like this hasn't happened before. While Apple's engineering team is no doubt massive, there's only so much a fixed group can find. We're talking about bugs in particular; while iOS 7's final build squashed a ton of quirks, a couple of security issues have presented... Read more...
The game's acronym may inspire laughter, but a recent hacking targeting it is as serious as a heart-attack (alright, maybe not that serious). Riot Games, LoL's developer, posted on its website this week that 120,000 transaction records from 2011 have been exposed (to someone, or some group), although thanks to the... Read more...
Over the past few years, many companies have altered their approach to the enterprise. Where IT departments once made purchasing recommendations based entirely on their own view of the company’s requirements, many administrators now get (often unsolicited) input from employees who don’t want to get saddled with computers, tablets,... Read more...
Do you use Java? If so, be aware that Oracle just released its "June 2013 Critical Update for Java SE," a collection of code that provides 40 new security fixes. All but three of them are security holes that can be exploited from a remote location without any kind of authentication. Four of the vulnerabilities affect client and server deployments,... Read more...
Facebook is making it easier to recover your Facebook account in the event that you ever forget your password (which, let’s be honest, we’ve all done once or twice). Instead of going through the rigamarole of resetting your password and answering a bunch of security questions to do so, the social network... Read more...
Own a website that runs on WordPress? You'll want to pay attention to this story. Since last week, there's been an ongoing brute-force attack that's targeted stand-alone WordPress installations. Like most login prompts, WordPress' will lock you out for some time after putting in an incorrect password a certain number... Read more...
In the cloud storage and sharing market, Dropbox is the prototypical service that everyone emulates, and LogMeIn’s new offering, Cubby, indeed bears a striking resemblance. Like Dropbox, it offers 5GB of free cloud storage that you can access, manage, and edit via a Web browser, mobile device, or synced desktop folder. If you invite... Read more...
Social networking site LinkedIn reportedly faces a $5 million class action lawsuit over a recent security breach that compromised the passwords of millions of members. The suit was filed by Katie Szpyrka in the U.S. District Court in the Northern District of California. Szpyrka says LinkedIn "failed to properly... Read more...
Yesterday, there were rumors aplenty that around 6.5 million LinkedIn passwords were stolen and posted on a Russian hacker forum, where the poster presumably was looking for some help decrypting them. LinkedIn, by way of a blog post by CEO Vicente Silveira, has confirmed that at least some of the leaked passwords belong to LinkedIn accounts.... Read more...
Cloud storage is all the rage these days, and Logitech's not missing the boat. The company has just announced the Alert Video Security System, which is gaining Dropbox support. A year or so ago, the Logitech Alert HD digital video security system was launched to help you watch over the people and places you care about the most. With Dropbox... Read more...
Lenovo and security go together quite well. The company's ThinkPad line has made a name for itself over the years as being one of the most robust, rugged and secure notebook lines on the market. And now, with business users more concerned about their privacy and security, the company is taking another big step to... Read more...
Prev 1 2 3 4 Next