Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

According to US-based security research firm FireEye, a Russian group it dubs APT28 is responsible for attacking a number of different government agency computers through exploitation of previously unknown vulnerabilities in Adobe Flash... Read more...
It's always fun to see which security flaws get exploited at Pwn2Own, and this year's event has proven to be no exception. In fact, it could be considered to be one of the most exciting events to date, with JungHoon Lee exploiting three... Read more...
Symantec made the unsettling announcement today that it has discovered sophisticated malware that has been operating successfully on and off since 2008. Named Regin, the malware launches in a series of stages and is designed to avoid... Read more...
Zero-day exploits are a nightmare for end-users and vendors alike as both groups have to scramble to patch and resolve problems. Today, Microsoft got tagged with one of the worst types of disclosures -- not only is there a vulnerability in... Read more...
For the second time in less than a year, AT&T is left with egg on its face after discovering that one of its employees is responsible for a data breach. In this latest instance, an insider sidestepped AT&T's "strict privacy and security guidelines" and was able to view confidential information... Read more...
Word to the wise -- be careful crossing through intersections, even when you have a green light. We don't want to overstate the threat, but apparently you really can hack into a traffic signal and change the light, just as you've seen in... Read more...
Google's Android OS has received its fair share of flack over the past couple of years for its security issues, but sometimes, it's not the company or its OS at fault: It's the third-party developers. Proof of that can be seen from the... Read more...
A group of Russian hackers known collectively as either "Energetic Bear" or "Dragonfly" is mounting sabotage operations against a number of power and oil companies primarily located in the U.S. and throughout parts of Europe. Among the... Read more...
You're a unique individual. Not just in the way you look, dress, and act, but also in the way you smell. Don't be offended, we're not saying you smell bad, we're just having a little talk about science. If you didn't have a unique scent... Read more...
You'd have to imagine that the birds in Angry Birds are some of the angriest around, but last night, a "friend" of the hacking group Syrian Electronic Army saw it fit to add to their angst. For an undetermined amount of time, an image was... Read more...
Don't you miss the days when teenagers used to get in trouble for crossing over old man Jenkin's lawn on the way to school? It's a different a era we live in, one where the landscape is connected through cyberspace and ripe for mischief of... Read more...
It'd be a little crazy to imagine ending 2013 without another breach-of-security story, so fortunate for us, BBC has come to the last-minute rescue. On December 25th, a Russian hacker is said to have listed a sale on a black market website that offered information about accessing a BBC server... Read more...
Mobile security has become an issue of increasing importance, as mobile use has skyrocketed in recent years while cybercriminals have simultaneously spent more time finding ways to attack. There are several solutions out there, but a major... Read more...
RSA decided to publicly address recent reports alleging it inked a $10 million contract with the National Security Agency (NSA) to use what's considered a flawed and broken encryption standard called elliptic curve cryptography. In an... Read more...
Another day, another thing-that-is-hacked. This time it was popular cloud storage service Dropbox, but fortunately, the hackers were security researchers. Two of them, actually, named Dhiru Kholia and Przemyslaw Wegrzyn, who found a way to... Read more...
Two security researchers from iSEC, Tom Ritter and Doug DePerry, have demonstrated the ability to hack into Verizon Wireless’ femtocells and spy on Verizon users with a simple wireless antenna. They say that they can intercept... Read more...
You probably never thought that simply charging your mobile device would make you susceptible to malware, but apparently these types of hardware hacks could be the next big thing among cyber criminals. To prove it, a trio of security... Read more...
A 60-page study released today by Mandiant, an American cyber security company, is garnering lots of attention on the web today. The detailed report provides evidence of Chinese government-sponsored "Advanced Persistent Threat" (APT)... Read more...
The antivirus market is enormous, responsible for billions in revenue each year. That being the case, it'd be easy to believe that current offerings are quite good, but not so claims a report (PDF) by security company iMPERVA. This... Read more...
In many ways, RIM’s once mighty BlackBerry brand is now an also-ran in a mobile market that’s dominated by Android and iOS devices, but today’s news bodes well for the Canadian company. RIM announced that its BlackBerry 10 platform has received the prized FIPS 140-2... Read more...
A new report by network security provider Kindsight suggests that 13 percent of all home networks in North America are infected with malware, which is slightly less than the infection rate of the previous quarter (14 percent). That works... Read more...
Of all the hundreds of thousands of computer viruses, trojans, rootkits, and worms that have been written since 'Elk Cloner' first appeared in the wild in 1981, the overwhelming majority of them have targeted computer software. Attacking computer hardware directly isn't impossible now (and... Read more...
Prev 1 2 3 4 5 Next