Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

The cybersecurity firm Zimperium, has published a blog post detailing a recently discovered Android malware campaign that has been ongoing since 2018. This campaign spreads a set of malicious apps the researchers are calling the “Schoolyard Bully Trojan” on account of the fact that the malicious apps are disguised as... Read more...
Researchers at the cybersecurity company Cyble have published a technical analysis of a new ransomware known as “AXLocker.” Aside from the regular data encryption performed by ransomware, AXLocker also searches victims’ systems for Discord login tokens, then hands these tokens over to the threat actor behind the... Read more...
Threat researchers at the cybersecurity firm Proofpoint have discovered an extensive malware campaign targeting readers of online news outlets. A threat actor tracked as TA569, also known as SocGholish, has managed to compromise the infrastructure of a media company that serves content to a large number of news... Read more...
Researchers at the threat analysis company ThreatFabric have published a report detailing some recent evolutions in Android malware droppers on the Google Play Store. Recent changes to Google Play policies restricting access to certain permissions have pushed malware developers to find workarounds. Google is... Read more...
It wasn't all that long ago that we had our first experience with Intel's 4th-generation Scalable Xeons, code-named Sapphire Rapids, and checked out some live benchmarks. In the demonstration, Intel put its pre-release silicon up against the current best from AMD, a server with a pair of Milan-based EPYC 7763 64-core... Read more...
The conventional wisdom when you think you've picked up some nasty Windows malware is to format the disk and start from scratch, and that's enough to defeat most hacks. However, it won't help with a new piece of malicious code floating around hacking forums. Security researchers are sounding the alarm over a new UEFI... Read more...
Last month, researchers at the cybersecurity firm GTSC discovered cyberattacks actively exploiting two zero-day vulnerabilities in the Microsoft Exchange email system. The researchers reported these two vulnerabilities to the Zero Day Initiative (ZDI), which verified this report and passed it on to Microsoft. The... Read more...
Threat analysis teams from two different cybersecurity firms, Cyderes and Stairwell, have published a joint report detailing a new ransomware technique that may be the next big evolution in ransomware. Rather than encrypting data on victims’ computers, ransomware may soon corrupt the data instead, rendering it... Read more...
Researchers at the cybersecurity firm ReasonLabs have discovered a credit card scam campaign estimated to have extracted tens of millions of dollars from tens of thousands of credit card holders. This scheme utilizes fake dating websites, a dedicated payment processor, and customer support services all created and... Read more...
Gravity is the enemy of most of the fragile glass sandwiches that pass for smartphones in 2022, but the rugged device niche lives on. Samsung has just announced a new generation of rugged devices for the US in the form of the Galaxy XCover6 Pro smartphone and Galaxy Tab Active4 Pro tablet. These devices run the same... Read more...
Research conducted by a team at the firmware security firm Binarly reveals that six vulnerabilities remain unpatched in various enterprise-grade HP laptops and desktops despite HP having developed patches for these vulnerabilities. Binarly discovered three of these vulnerabilities last year and notified HP of their... Read more...
A nasty bit of Android malware previously lurking on the Google Play Store has returned with additional capabilities. Known as SharkBot, the malware is designed to steal user login credentials, particularly credentials used to access financial applications. The malware has also been found to initiate money transfers... Read more...
On September 2, 2022, Samsung reported that it had discovered a security breach of their U.S. systems. Unfortunately for some Samsung customers, this means that their personal information may have leaked out into the wild. The report states that the initial indication came in July, and by August it had established the... Read more...
There is widespread concern over the amount of personal data siphoned off by Google, Facebook, and other big tech companies, but that's nothing compared to what your mobile carrier knows. A startup called Invisiv aims to address that with a new beta of its mobile data service. With Pretty Good Phone Privacy (PGPP)... Read more...
Samsung talked about its next gen storage technologies during a keynote at the Flash Memory Summit 2022. During the Santa Clara Convention Center event, the South Korean electronics giant touched on what it bills as transformative technology coming to a wide range of devices from the data center to your... Read more...
Earlier this year, SK Hynix acquired Intel’s NAND flash business and formed a new entity, dubbed Solidigm. For all intents and purposes – to this point, at least – Solidigm's operation is a well-oiled machine and subsidiary that has taken Intel’s established and respected NAND flash business and ran with it under a... Read more...
Secret Service Director James Murray has left his post in order to take over as the Chief Security Officer for Snap Inc. The 27-year veteran will serve his last day with the storied security service on July 30, 2022. The Secret Service is the cream of the crop when it comes to security. It undertakes protecting the... Read more...
Samsung is consolidating two of its software services, Samsung Pay and Samsung Pass, into a single Samsung Wallet digital platform. This will allow Galaxy device owners to securely and more easily manage their digital keys, boarding passes, identification cards, loyalty cards, and more in one mobile application. The... Read more...
It seems that every day a new malware threat rears its ugly head. Every once in a while though, the new threat is a version of an old threat. For example, PDFs as a method of malware delivery. That's what researchers at HP Wolf Security have recently found. A less common, but seemingly effective method of malware... Read more...
When you fill out an online form and hit the submit button, you're willingly transmitting your personal data to the website and any third parties you may have agreed to in the fine print. That's fair game. However, an alarming security report suggests your data is sometimes transmitted even if you change your mind and... Read more...
When you are investigating a crime, one of the most important things to establish is "motive." If you know a crime has been committed, having an understanding of why it happened is a critical step to figuring out who did it. In the strictest sense, installing software on someone else's computer isn't a crime. It's... Read more...
Making fast SSDs for consumers is a good way to build street cred with enthusiasts, but the real money lies in the enterprise sector. This is not lost on Seagate and Phison. Having already worked together on the FireCuda 530 series, which is one of the fastest SSDs on the market, Seagate and Phison announced a long... Read more...
Prev 1 2 3 4 5 Next