Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Data centers have a new high-tech toy to play with, courtesy of Samsung. Called the CXL Memory Expander, it sort of looks like an external storage device (from the renders) in the vein of Samsung's T7 Portable SSD, but it is nothing of the sort. This is essentially a memory expansion device that leverages the new... Read more...
Given that data leaks are occurring even more frequently these days, it is a matter of when, not if, your information makes it to the open web. Cybercriminals are constantly on the prowl looking for a new way to make a quick buck, and clearly the system is working for them. New data reports that over 5 billion records... Read more...
Israeli-based digital intelligence company Cellebrite provides software that enables the extraction of data from devices. While law enforcement loves this, it raises ire from phone manufacturers and individuals alike, with privacy concerns abound. Interestingly, the CEO of Signal got their hands on one of these... Read more...
Security breaches and data loss have been rampant problems for companies in recent years, with it seeming like there was a new victim every week. These security issues have also had some dire consequences, such as the first possible ransomware-related death at a hospital. As such, organizations are facing a harsh... Read more...
When it comes to updates for Android devices, Google has made some critical infrastructure improvements over the years to streamline the process for users. It's now easier for OEMs to push out standalone updates for devices, including security updates, to customers. However, for whatever reason, some OEMs aren't too... Read more...
Security researchers at Trend Micro say they have uncovered "several vulnerabilities" within an Android application that has been downloaded more than 1 billion times from Google Play. The app is called SHAREit by Smart Media 4U, and it is designed to make transferring photos, videos, music, and other things a snap... Read more...
Complete honesty is not a mantra for many online retail sites, at least according to a study released by Princeton University. The school conducted an automated crawl of more than 11,000 online shops and found that around one in six used some form of deceptive practice to hawk their goods. While some of those online... Read more...
Attackers with physical access to a device can generally do the most damage to a machine. This remains true with CVE-2020-8705, where an attacker with physical access can gain control of the system firmware while the device resumes from a sleep state. This means there could be privilege escalations, data loss, and... Read more...
A security firm warns that an "unskilled attacker" could leverage a security flaw in SonicWall VPN (virtual private network) appliances to run arbitrary code remotely, causing a persistent denial of service (DoS) condition. Or put more plainly, the SonicWall VPN has a serious security hole that makes it easy for even... Read more...
Samsung's line of Galaxy handsets hardly need an introduction. By now, even casual smartphone shoppers are familiar with the Galaxy brand, which spans top-of-the-line flagships like the Galaxy Note 20 and Galaxy S20, to much more affordable options like the Galaxy A and Galaxy 5G. And of course there is the innovative Galaxy Z Fold 2. But... Read more...
The internet is a place where it's difficult to trust anything that anyone says. A recent case of more than a handful of VPN providers who claim to keep no logs of their user's activity, yet leaked activity logs, highlights that you can't trust anyone online. As it turns out, the seven VPN providers were logging user... Read more...
TikTok has taken the world by storm as people of all ages uses the social networking platform to share videos. People use the platform to lip-sync to their favorite songs, perform short skits, or any number of humorous hijinks that the platform has been recognized for over the past year. It’s become a blockbuster app... Read more...
Sony has announced via an official PlayStation blog post that it has launched a new bug bounty program for the PlayStation 4 game console in collaboration with the security platform HackerOne. Sony says that it started the Bug Bounty program because security is a fundamental part of creating amazing experiences for... Read more...
A team of researchers warn that combo chips that implement multiple wireless technologies in PCs and mobile devices are susceptible to a side-channel exploit called Spectra. Not to be confused with Spectre (or Meltdown), this side-channel vulnerability affects chips that combine Wi-Fi and Bluetooth connectivity, and... Read more...
A number of supercomputers across Europe have been targeted by malware that focuses on mining for cryptocurrency (Monero). The malware has forced supercomputers in the UK, Germany, and Switzerland to be shutdown as operators investigate the security incidents. The high-performance computing center in Spain was also... Read more...
A security researcher that goes by GreenTheOnly on Twitter recently shared some information that impacts some of the most popular Tesla vehicles. According to Green, some Tesla hardware currently being sold on eBay retains a significant amount of personal information from previous owners even after a reset. The parts... Read more...
Sophos has published an emergency security update to patch a zero-day vulnerability in its XG enterprise firewall product. The patch plugs a hole that was being abused in the wild by hackers. Sophos says that it learned of the zero-they exploit on Wednesday of last week, after receiving a report from one of its... Read more...
Security researchers at a university in Isreal have developed a novel approach to covertly siphoning sensitive data from PCs. At its core, this is yet another malware scheme. But what makes this method somewhat unique is that it is transmits data from a target PC to a nearby smartphone (or other device) through fan... Read more...
A new security vulnerability has now been detailed that exposes portions of your device’s Wi-Fi traffic to nefarious individuals. The Kr00k vulnerability was disclosed today by ESET researchers presenting at the RSA Security Conference. The problem lies with Wi-Fi chips that were manufactured by Broadcom and... Read more...
A few days ago, some Samsung device owners reported receiving a mysterious "1/1" push notification on their smartphones, from the company's Find my Mobile app. Initially, Samsung explained it as a "message sent unintentionally during internet test[ing]" and said there was "no effect" on user's devices. However... Read more...
It is estimated that there are over 50,000 WordPress plugins and more than 1.25 billion total plugin downloads. However, not all plugins are created equal. Security researchers recently discovered plugin vulnerabilities that could affect over 400,000 WordPress-based sites. These vulnerabilities were found in the... Read more...
Security researchers say millions of Android phones are susceptible to a newly discovered vulnerability that, if exploited, could allow an attacker to spy on users through the phone's microphone, take photos with the phone's camera, read and send SMS text messages, make and record phone conversations, phish login... Read more...
First ... Prev 2 3 4 5 6 Next