Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

There are reportedly nearly two billion WhatsApp users globally as of 2021. This is a number that is far too tempting to those with bad intent. A phishing campaign recently impacted nearly 28,000 email accounts by impersonating a notification for a WhatsApp voicemail message. The phishing campaign utilizes... Read more...
It seems like just about every week there is some new malware threat to mobile users, especially for those who use Android. What if we told you that many of those new threats are not actually new at all? According to Dr. Web, an anti-malware software provider and security research organization, there was a... Read more...
The hacking group Lapsus$ (or "LAPSUS$") has been extra busy the past couple of weeks. First it breached NVIDIA and stole what it claims is 1TB of data, including what appears to be DLSS source code, and now it has plundered sensitive information from Samsung. Proprietary source code is involved there as well, Samsung... Read more...
A few days after the last security update for the Google Pixel 3 ever, Samsung has announced that select Galaxy devices get four generations of updates. With pre-orders now available for the Galaxy S22 series in full swing, this announcement steps all over Google's policy of up to three years of OS updates for its... Read more...
A cybersecurity firm just recently discovered a search engine optimization (SEO) poisoning campaign intended to dupe users into installing malware on their computers. The campaign works by leveraging various SEO techniques, such as cramming tons of keywords into the source code of various malicious webpages, in order... Read more...
Having entered a new year, cybersecurity experts, researchers, and companies are reflecting on 2021 and assessing the state of cybersecurity so that we can better understand and prepare for threats going forward. Unfortunately, the outlook going forward into 2022 seems pretty disheartening as far as ransomware is... Read more...
Many websites and applications employ various device fingerprinting methods to identify users and track their activity across websites and applications over time. The Electronic Frontier Foundation has a good explainer on this subject, as well as a tool to test how well your browser protects you from fingerprinting... Read more...
Samsung has built a fingerprint security chip that is aimed at making payment cards and other types of biometric cards more secure. The new security solution combines a fingerprint sensor with other technology in order to strengthen your payment cards against thieves. In a day and age where carrying cash is... Read more...
It felt like we were constantly reading about data compromises last year. Unfortunately, this statement is not far from the truth. According to the Identity Theft Resource Center (ITRC), there were 1,862 data compromises in 2021. The overall number of data compromises was up by 63% from 2020 and the number of... Read more...
When people think of malware and malicious code, they might imagine an infected file or download from a sketchy email or website on their computer. However, this sort of infection is realistically only the tip of the iceberg and often some of the least sophisticated. Researchers at Kaspersky have found a complex... Read more...
It's a good idea for big organizations to hire security researchers for help securing their systems. No matter how much effort you put into something (like securing your network), it can sometimes require a person looking at it from a different angle to point out a problem you couldn't see. Given that lede and... Read more...
Do you let your browser store logins for websites like Twitter, Facebook, or HotHardware? Well, you probably shouldn't. Not only does it let anyone who gets on your PC access your personal information, but it also opens you up to easy attacks from "info-stealer" malware. South Korean cyber-security firm Ahnlab just... Read more...
Nobody wants to rack up bad karma, which should be reason alone not to pilfer movies from the internet via BitTorrent or whatever other means. But even disregarding the moral aspect or pirating movies and games, there's another reason not to engage in such behavior—you could end up with a malware infection. Some... Read more...
You may have heard about a recent prank making the rounds in Minecraft. By sending a chat message starting with "${jndi:ldap://" users could make their friends' Minecraft client open a browser window and go to a specific website. So naturally, pranksters were sending their friends to all kinds of shocking and... Read more...
Security researchers at F-Secure discovered security vulnerabilities affecting over 150 multi-function printer models from HP. That's the bad news. The worse news is, in addition to impacting so many printer models, these are labeled as Critical and High security flaws. Ready for the good news? HP has issued... Read more...
There's no denying that cybersecurity is a major concern for anyone on the internet. One wrong move can get your device infected with malware that can steal your personal data, corrupt or encrypt your precious, unreplacable files, and even worse, snatch your credentials. Even if you avoid malware, there's myriad other... Read more...
Do you ever forget to type the TLD (like, ".com") for websites that you visit, then click the top result when the inevitable search comes up? We might recommend you to stop doing that in the future. At least on Google and Bing, the first few results are advertisements, and those advertisements might not be as safe as... Read more...
Cheaters never prosper, especially when they are being targeted by ransomware-laden files scattered about the internet. Whether or not comeuppance like this is deserved, Japanese Minecraft players looking for alternate accounts to cheat or circumvent bans are being infected by the Chaos ransomware variant in a ghastly... Read more...
Everyone who uses an Android phone has probably had some security-conscious acquaintance ask, "don't you know how much data your phone is harvesting?" Most of us shrug it off as one of the unavoidable circumstances of modern life: you want a smartphone, you deal with data harvesting. Still, some folks aren't so... Read more...
Network Attached Storage (NAS) devices from Synology are being targeted by the StealthWorker Botnet in an ongoing brute-force attack that could lead to ransomware infections. Perhaps we should just drop the “network attached” of NAS portion for now. According to an August 4th report, Synology’s Product Security... Read more...
A seven-year-old local privilege escalation bug has reared its head and finally got a fix. When it was available, exploiting the vulnerability in the polkit authentication service could have allowed attackers to get a root shell on several actively-used Linux distros. On Linux, polkit is effectively a bouncer of... Read more...
The threat actors behind the SolarWinds attacks late last year have come back online and are targeting international development, humanitarian, and human rights organizations, according to new data from Microsoft. The Russian-based hacking group, called Nobelium, managed to compromise an email marketing account for... Read more...
Prev 1 2 3 4 5 Next