Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

It's always fun to see which security flaws get exploited at Pwn2Own, and this year's event has proven to be no exception. In fact, it could be considered to be one of the most exciting events to date, with JungHoon Lee exploiting three major browsers, and securing a record $110,000 payout for one of the... Read more...
Symantec made the unsettling announcement today that it has discovered sophisticated malware that has been operating successfully on and off since 2008. Named Regin, the malware launches in a series of stages and is designed to avoid detection at each stage. Symantec hasn’t identified the organization that created... Read more...
Zero-day exploits are a nightmare for end-users and vendors alike as both groups have to scramble to patch and resolve problems. Today, Microsoft got tagged with one of the worst types of disclosures -- not only is there a vulnerability in every single shipping version of Windows, the vulnerability has been exploited... Read more...
For the second time in less than a year, AT&T is left with egg on its face after discovering that one of its employees is responsible for a data breach. In this latest instance, an insider sidestepped AT&T's "strict privacy and security guidelines" and was able to view confidential information of around 1,600 AT&T customers. AT&T sent a Read more...
Word to the wise -- be careful crossing through intersections, even when you have a green light. We don't want to overstate the threat, but apparently you really can hack into a traffic signal and change the light, just as you've seen in countless Hollywood films featuring the token computer hacker. This was proven by... Read more...
Google's Android OS has received its fair share of flack over the past couple of years for its security issues, but sometimes, it's not the company or its OS at fault: It's the third-party developers. Proof of that can be seen from the results of a recent study conducted by the same firm, Codenomicon, that discovered... Read more...
A group of Russian hackers known collectively as either "Energetic Bear" or "Dragonfly" is mounting sabotage operations against a number of power and oil companies primarily located in the U.S. and throughout parts of Europe. Among the group's targets are energy grid operators, major electricity generation firms... Read more...
You're a unique individual. Not just in the way you look, dress, and act, but also in the way you smell. Don't be offended, we're not saying you smell bad, we're just having a little talk about science. If you didn't have a unique scent, it would be difficult for dogs to track you using their noses, but part of the... Read more...
You'd have to imagine that the birds in Angry Birds are some of the angriest around, but last night, a "friend" of the hacking group Syrian Electronic Army saw it fit to add to their angst. For an undetermined amount of time, an image was plastered on the main Angry Birds site that changed the name to "Spying Birds"... Read more...
Don't you miss the days when teenagers used to get in trouble for crossing over old man Jenkin's lawn on the way to school? It's a different a era we live in, one where the landscape is connected through cyberspace and ripe for mischief of a totally different kind. Hence it shouldn't be all that shocking to find out... Read more...
It'd be a little crazy to imagine ending 2013 without another breach-of-security story, so fortunate for us, BBC has come to the last-minute rescue. On December 25th, a Russian hacker is said to have listed a sale on a black market website that offered information about accessing a BBC server, something that US firm Hold Security picked up... Read more...
Mobile security has become an issue of increasing importance, as mobile use has skyrocketed in recent years while cybercriminals have simultaneously spent more time finding ways to attack. There are several solutions out there, but a major one is Samsung’s Knox. According to researchers at Ben-Gurion University... Read more...
RSA decided to publicly address recent reports alleging it inked a $10 million contract with the National Security Agency (NSA) to use what's considered a flawed and broken encryption standard called elliptic curve cryptography. In an attempt to set the record straight, the RSA stated in a blog post that it's all a... Read more...
Another day, another thing-that-is-hacked. This time it was popular cloud storage service Dropbox, but fortunately, the hackers were security researchers. Two of them, actually, named Dhiru Kholia and Przemyslaw Wegrzyn, who found a way to reverse engineer Dropbox, which the SD Times calls a heavily obfuscated Python... Read more...
Two security researchers from iSEC, Tom Ritter and Doug DePerry, have demonstrated the ability to hack into Verizon Wireless’ femtocells and spy on Verizon users with a simple wireless antenna. They say that they can intercept people’s phone calls, text messages, picture messages, and even data. The... Read more...
You probably never thought that simply charging your mobile device would make you susceptible to malware, but apparently these types of hardware hacks could be the next big thing among cyber criminals. To prove it, a trio of security researchers built a proof-of-concept charger that they claim is capable of silently... Read more...
A 60-page study released today by Mandiant, an American cyber security company, is garnering lots of attention on the web today. The detailed report provides evidence of Chinese government-sponsored "Advanced Persistent Threat" (APT) hacking groups and highlights the activities of one group in particular. Referred to... Read more...
The antivirus market is enormous, responsible for billions in revenue each year. That being the case, it'd be easy to believe that current offerings are quite good, but not so claims a report (PDF) by security company iMPERVA. This report states a couple of alarming facts, including one that shows that less than... Read more...
In many ways, RIM’s once mighty BlackBerry brand is now an also-ran in a mobile market that’s dominated by Android and iOS devices, but today’s news bodes well for the Canadian company. RIM announced that its BlackBerry 10 platform has received the prized FIPS 140-2 certification from the National Institute of Standards and... Read more...
A new report by network security provider Kindsight suggests that 13 percent of all home networks in North America are infected with malware, which is slightly less than the infection rate of the previous quarter (14 percent). That works out to one in seven home networks. In addition, some 6.5 percent of broadband... Read more...
Of all the hundreds of thousands of computer viruses, trojans, rootkits, and worms that have been written since 'Elk Cloner' first appeared in the wild in 1981, the overwhelming majority of them have targeted computer software. Attacking computer hardware directly isn't impossible now (and wasn't then), but it tends to be extremely difficult... Read more...
Did pigs fly? Because Russia has filed criminal charges against a spammer, something unprecedented in that country, the origination point of so many unwanted e-mails. Moscow police on Tuesday raided the home of Igor Gusev who is alleged to own a botnet with a partner that brought the pair $120 million in revenue over... Read more...
Prev 1 2 3 4 5 Next