Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

The threat actors behind the SolarWinds attacks late last year have come back online and are targeting international development, humanitarian, and human rights organizations, according to new data from Microsoft. The Russian-based hacking... Read more...
Data centers have a new high-tech toy to play with, courtesy of Samsung. Called the CXL Memory Expander, it sort of looks like an external storage device (from the renders) in the vein of Samsung's T7 Portable SSD, but it is nothing of the... Read more...
Given that data leaks are occurring even more frequently these days, it is a matter of when, not if, your information makes it to the open web. Cybercriminals are constantly on the prowl looking for a new way to make a quick buck, and... Read more...
Israeli-based digital intelligence company Cellebrite provides software that enables the extraction of data from devices. While law enforcement loves this, it raises ire from phone manufacturers and individuals alike, with privacy concerns... Read more...
Security breaches and data loss have been rampant problems for companies in recent years, with it seeming like there was a new victim every week. These security issues have also had some dire consequences, such as the first possible... Read more...
When it comes to updates for Android devices, Google has made some critical infrastructure improvements over the years to streamline the process for users. It's now easier for OEMs to push out standalone updates for devices, including... Read more...
Security researchers at Trend Micro say they have uncovered "several vulnerabilities" within an Android application that has been downloaded more than 1 billion times from Google Play. The app is called SHAREit by Smart Media 4U, and it is... Read more...
Complete honesty is not a mantra for many online retail sites, at least according to a study released by Princeton University. The school conducted an automated crawl of more than 11,000 online shops and found that around one in six used... Read more...
Attackers with physical access to a device can generally do the most damage to a machine. This remains true with CVE-2020-8705, where an attacker with physical access can gain control of the system firmware while the device resumes from a... Read more...
A security firm warns that an "unskilled attacker" could leverage a security flaw in SonicWall VPN (virtual private network) appliances to run arbitrary code remotely, causing a persistent denial of service (DoS) condition. Or put more... Read more...
Samsung's line of Galaxy handsets hardly need an introduction. By now, even casual smartphone shoppers are familiar with the Galaxy brand, which spans top-of-the-line flagships like the Galaxy Note 20 and Galaxy S20, to much more affordable options like the Galaxy A and Galaxy 5G. And of... Read more...
The internet is a place where it's difficult to trust anything that anyone says. A recent case of more than a handful of VPN providers who claim to keep no logs of their user's activity, yet leaked activity logs, highlights that you can't... Read more...
TikTok has taken the world by storm as people of all ages uses the social networking platform to share videos. People use the platform to lip-sync to their favorite songs, perform short skits, or any number of humorous hijinks that the... Read more...
Sony has announced via an official PlayStation blog post that it has launched a new bug bounty program for the PlayStation 4 game console in collaboration with the security platform HackerOne. Sony says that it started the Bug Bounty... Read more...
A team of researchers warn that combo chips that implement multiple wireless technologies in PCs and mobile devices are susceptible to a side-channel exploit called Spectra. Not to be confused with Spectre (or Meltdown), this side-channel... Read more...
A number of supercomputers across Europe have been targeted by malware that focuses on mining for cryptocurrency (Monero). The malware has forced supercomputers in the UK, Germany, and Switzerland to be shutdown as operators investigate... Read more...
A security researcher that goes by GreenTheOnly on Twitter recently shared some information that impacts some of the most popular Tesla vehicles. According to Green, some Tesla hardware currently being sold on eBay retains a significant... Read more...
Sophos has published an emergency security update to patch a zero-day vulnerability in its XG enterprise firewall product. The patch plugs a hole that was being abused in the wild by hackers. Sophos says that it learned of the zero-they... Read more...
Security researchers at a university in Isreal have developed a novel approach to covertly siphoning sensitive data from PCs. At its core, this is yet another malware scheme. But what makes this method somewhat unique is that it is... Read more...
A new security vulnerability has now been detailed that exposes portions of your device’s Wi-Fi traffic to nefarious individuals. The Kr00k vulnerability was disclosed today by ESET researchers presenting at the RSA Security... Read more...
A few days ago, some Samsung device owners reported receiving a mysterious "1/1" push notification on their smartphones, from the company's Find my Mobile app. Initially, Samsung explained it as a "message sent unintentionally during... Read more...
It is estimated that there are over 50,000 WordPress plugins and more than 1.25 billion total plugin downloads. However, not all plugins are created equal. Security researchers recently discovered plugin vulnerabilities that could affect... Read more...
First ... Prev 2 3 4 5 6 Next