Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

It is an awful feeling to have something stolen from your property, like a package left on your doorstep, or to know that a burglar has been rummaging in your home. Fortunately, home security solutions have come a long way. To that end, Ring today announced the Floodlight Cam Wired Pro, which is basically a high-tech... Read more...
When someone resets a password, a code is typically sent to an account holder's email, which is then input into a website (or app) for verification purposes. Moreover, protections should prevent that code from being brute-forced by a hacker, but this isn't always the case. Laxman Muthiyah, a security researcher... Read more...
Remembering a bunch of different passwords for multiple websites can be difficult, and that is especially true if you are using hard-to-guess ones that mix letters, numbers, symbols, and capitalization, as is good practice. Password managers offer to handle the remembering part for you, and a for a long time, LastPass... Read more...
Ring is on a mission to "make neighborhoods safer" by making and selling nifty video surveillance doorbells. Its newest model, the Ring Video Doorbell Pro 2, is not only its most advanced and full-featured model to date, it brings together a cornucopia of technologies like 3D motion detection with radar and a Bird's... Read more...
If people trust their information with businesses tasked with keeping them safe, those companies should at least try to take security seriously. It seems that is not necessarily the case, as a flaw in an app created by Ring was exposing precise location data of customers who posted to the app, when it should have been... Read more...
During the coronavirus pandemic, many people who have been working and learning from home have turned to video chat service Zoom. However, the service has had more than its fair share of issues with security and privacy over the last few months. Two new vulnerabilities have surfaced in the video chat platform that... Read more...
As the coronavirus pandemic continues around the world, everyone's lives have changed. The way we work and learn is significantly different now than it was only a few months ago as people shelter in place, and offices and schools around the globe have been forced to move to a distance model. Teaching from home has... Read more...
Technology companies sometimes talk about wanting to move on from passwords in favor of other authentication methods, with biometric security leading the way. But are biometric methods really secure? Researchers from Cisco's Talos division put fingerprint scanning under the microscope, and found some interesting... Read more...
Zoom, makers of the popular video conferencing software that goes by the same name, suddenly finds itself in the limelight, though not just because the Coronavirus outbreak has more people than ever working from home. Following a controversy over its data collection policy (which Zoom has apologized for), security... Read more...
A research firm called Which? has poured through Google data and claims that two out of every five Android users around the world are no longer receiving vital security updates from Google. That means that 40 percent of all Android devices globally are at risk of data theft, ransomware, and other malware attacks that... Read more...
How much does a ransomware or data breach attack affect hospital services? A recent study determined that hospitals who had been hit by a cyber attack witnessed increased death rates among patients with heart issues. Cyber attacks and the remediations that follow frequently increase the amount of time a patient waits... Read more...
It's bad enough we have to worry about sharks with frickin' laser beams attached, but now we have to be vigilant against the threat lasers present to smart home speakers and other devices with digital assistants. How so? Security researchers at the University of Electro-Communications in Tokyo and at the University of... Read more...
Security researchers at Kaspersky have identified a new strain of malware affecting Chrome and Firefox browsers. The researchers say the malware's authors "put a lot of effort" into how it manipulates digital certificates and mucks with outbound TLS traffic, which ultimate compromises encrypted... Read more...
Researchers recently uncovered Windows kernel security flaws that affect over 40 drivers from 20 different vendors. The vulnerabilities could give attackers access to a device's hardware and firmware. Researchers from Eclypsium shared their troubling findings this past week at the DEF CON 27 security conference in Las... Read more...
This mobile app is definitely something to scream about in more ways than one. The Android game “Scary Granny ZOMBYE Mod: The Horror Game 2019” s stealing users’ Google and Facebook data. The malicious app attempts to siphon both data and money from its users to attackers.  “Scary Granny ZOMBYE Mod: The Horror Game... Read more...
Sometimes it feels as though nary a day goes by without someone sounding the alarm on a new security vulnerability. More recently, there has been a lot of hoopla over side-channel exploits, such as Spectre and Meltdown, and various other variants. Here is another one to add to your mental catalog of... Read more...
Amazon is doing very well in the booming smart speaker market with its popular Alexa-powered line of Echo devices. Amazon had moved 100 million Alexa devices as of January 2019, and as speakers gain popularity, more issues are arising that consumers should be aware of. A new report claims that Amazon has thousands... Read more...
It was just a few weeks ago when we told you about the SPOILER speculative attack that affects Intel processors, and now we’re learning of a new security exploit that takes advantage of the company’s Visualization of Internal Signals Architecture (VISA). The VISA exploit was detailed to the public at a Black Hat Asia... Read more...
Owners of Ring security cameras have reason to feel violated according to a new report. While most thought that the cameras were able to detect what was going on inside and around their homes using automated computer vision technologies, there may have been an entire team of humans watching the footage as well. An... Read more...
AI can be a good thing or a bad thing, depending on what the AI is designed to do. Many AIs are meant to do things like help doctors diagnose disease, though other AI technologies can be turned towards more nefarious deeds. For example, a team of IEEE researchers has devised a method of harnessing an AI to generate... Read more...
Researchers from Radboud University in the Netherlands have announced a flaw that affects some SSDs that feature hardware-based security; the flaw could allow an attacker to completely bypass disk encryption. Bypassing the encryption would give the hackers full access to the local data without having to know the... Read more...
Macs used to have a persona of "no viruses or hacks" with many feeling like the MacBook and other Apple computers were more secure and therefore better than Windows counterparts. This was a long-running argument in PC enthusiast circles and despite ample evidence that Macs are vulnerable to attacks, some still feel... Read more...
Prev 1 2 3 4 5 Next