Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Macs used to have a persona of "no viruses or hacks" with many feeling like the MacBook and other Apple computers were more secure and therefore better than Windows counterparts. This was a long-running argument in PC enthusiast circles and despite ample evidence that Macs are vulnerable to attacks, some still feel... Read more...
Reddit has announced that it suffered a security breach between June 14 and June 18 of this year. The website learned of the hack on June 19 and says that an attacker was able to compromise the accounts of a few Reddit employees along with Reddit's cloud and source code hosting providers. The main attack was... Read more...
A team of researchers has discovered a vulnerability in Android that was thought to be already patched by Google, but is theoretically able to bypass current mitigations and gain unauthorized access to handsets and tablets. Called RAMpage, it's utilizes variations of the Rowhammer attack method that Google's security... Read more...
Security researchers are warning anyone who uses PGP (Pretty Good Privacy) or S/MIME for email encryption to disable the scheme in their email clients right away, and to uninstall tools that automatically decrypt PGP-encrypted email, due to a security flaw. They've discovered a critical vulnerability dubbed EFAIL that... Read more...
The big news in security (or lack thereof) recently has been the Meltdown and Spectre issues that have plagued Intel, AMD, and Apple. Those aren’t the only security issues that computer users are facing. Security research firm F-Secure has found a new security flaw that it says affects Intel Active Management... Read more...
A security expert at Belgian university KU Leuven has discovered a major vulnerability in the Wi-Fi Protected Access II (WPA2) protocol that could a expose a user's wireless Internet traffic, including usernames and passwords that are entered into secure websites. The vulnerability affects most devices and several... Read more...
Do you need a password manager to keep track of all your obscure, special character-filled and lengthy passwords necessary for various websites? It used to be that we would pick a simple, single password for multiple accounts and websites, until the rise of online exploits and hackers made such basic security... Read more...
Researchers from Exodus Intelligence discovered a zero-day attack that threatens most of the popular smartphones on the market today. The hack is called Broadpwn and it affects devices running iOS and Android. Specifically all Samsung Galaxy S3 through Galaxy S8 devices are susceptible as are the Note 3, 6, 6X, and... Read more...
There might not be a storage medium that's definitively indestructible, or perfectly reliable, but solid-state storage would rank near the top. A hard drive, for example, might be able to house a large amount of data, but if it's dropped to the ground, or its host PC is bumped hard enough, all of that data could... Read more...
There are many different methods of hacking. Most of them involve some sort of software code, whether it is installing malware on a system or hacking a vulnerability to gain unauthorized access to a system or device. The Internet of Things (IoT) category is especially susceptible to hacking due to a surprising lack of... Read more...
Businesses are having to contend with a lot more ransomware attacks than ever before. According to SonicWall's 2017 Annual Threat Report, there has been a meteoric rise in ransomware attacks in recent years, going from nearly 4 million attack attempts in 2015 to 638 million in 2016. That is a staggering 167x... Read more...
When ransomware strikes, its impact could range from mild to severe. Sometimes, ransomware targets regular users, while other times, it targets important mega-corporations (or even police stations). In this latest incident, it affected a hotel, and subsequently ran the risk of affecting all of its guests. Here it... Read more...
The rise of the Internet has forever changed the way we go about our daily lives and made certain things more convenient, but the more online services a person uses, the higher the potential privacy cost. That's been a rising deterrent for Americans, many of which now avoid certain online activities over concerns... Read more...
Buying into the Internet of Things (IoT) movement that's emerging means putting a great deal of trust into the cloud. It's a double-edged sword, because on the one hand the cloud is key to smart conveniences offered by IoT devices, but it also introduces risk. In case we need reminding of the latter, cybersecurity... Read more...
Tired of reading about the FBI and Apple trading blows over an encrypted iPhone yet?  Well relief may be in sight.  This evening, the FBI filed a request to delay Tuesday's court hearing on the matter, and now that request has been accepted by U.S. Magistrate Judge Sheri Pym. Why has the FBI suddenly changed... Read more...
There have been many juicy bits of info to come out of this year's Black Hat conference, including hacking into autos, Macs that suffer a Thunderbolt bug, Microsoft boosting its bug bounty, and yet more vulnerabilities relating to Android. But wait - there's more! According to Christopher Domas, a researcher for... Read more...
Remember when getting hacked meant loss of control of your PC and/or stolen data? It could be embarrassing, sure, and you could even be fired if a weak password contributed to the theft of sensitive company information. However, more recent hacks of shown a frightening trend towards causing physical harm. Earlier... Read more...
Is there anything scarier than the thought of a hacker remotely taking control of your vehicle's steering and braking functions as you barrel down the highway? Well sure, being eaten alive by flesh eating zombies like an episode of The Walking Dead would cause most people to soil their undergarments, but losing... Read more...
If you didn't know what HTTPS was two-years-ago, chances are you're familiar with it now. Ever since Edward Snowden blew the whistle on NSA spying, the world has gradually been improving its efforts to to protect its data - either at the user or government level. Last fall, Google said that it was going to begin preferring websites that Read more...
Given their importance, it'd be easy to believe that an institution such as the IRS would have sufficient security measures in place to protect our data - the tax information of everyone in the United States. As we discovered last week though, that's not at all the case. We learned on Wednesday that at least... Read more...
It looks like a cyberattack that hit the White House last year by Russian hackers was a bit more serious than originally presented. The biggest takeaway is the fact that president Obama's personal emails were accessed, including both sent and received messages. That's the downside; the upside is that it appears... Read more...
It's been a mere day since we last talked about an SSL-related vulnerability in iOS, and we couldn't even make it beyond hump day before another popped-up. This one is quite interesting, though, and not to mention quite severe. Researchers at Skycure have discovered that by generating a specifically-crafted SSL... Read more...
Prev 1 2 3 4 5 Next