Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Using a screen protector is a common way to help prevent smartphone displays from getting scratched, scuffed, or even shattered. On the Galaxy S10 series, however, it's been discovered that a screen protector can inadvertently prevent the in-display fingerprint sensor from working correctly. The issue was brought... Read more...
At the CS3sthlm security conference in Stockholm, Sweden later this month, security researcher Monta Elkins, the "Hacker-in-Chief" at FoxGuard Solutions, will demonstrate a proof-of-concept hardware hack involving spy chips implanted onto enterprise IT equipment, with a budget of less than $200. The idea of... Read more...
The latest “Joker” spyware is no laughing matter as it can easily compromise a lot of the personal data you keep on your phone. Researchers recently discovered spyware that can access your SMS messages, contact list and other information. The spyware was found in over 24 Android apps on Google Play and has infected... Read more...
Samsung's Galaxy Note series of large format Android smartphones has never been about compromise. The pen-wielding, hybrid devices have always been bigger, more powerful and more capable with larger batteries and as many bells, whistles and features as Samsung could throw at the Note's spec list. As such, Galaxy Note... Read more...
A significant security issue with a popular Mac video conferencing company Zoom has surfaced. The security issue was made public by a researcher named Jonathan Leitschuh after a 90-day grace period to give Zoom time to fix the problem. The vulnerability could impact a variety of browsers running on Mac computers... Read more...
It is often recommended that one of the best ways to avoid malware on mobile devices is to stick with established, reputable app stores. The two big ones are Google's Play Store and Apple's App Store, for Android and iOS, respectively. But is this a foolproof way to avoid malware? The answer is no, according to a... Read more...
It is common knowledge that websites like to track your activity through cookies, but might we be giving up a bit too much privacy when surfing the web? The answer may depend on the specific browser you are using. In a recent examination of Google Chrome, a tech expert said he uncovered some startling differences in... Read more...
With good intentions, Samsung took to Twitter to remind smart TV owners to scan their televisions for malware, and the Internet reacted about as you would expect. Snarky and indignant replies followed, and of course so did the jokes. And with good reason—after all, Samsung just made one heck of an argument to avoid... Read more...
Back in 2017, the National Security Agency (NSA) lost control of one of its hacking tools called EternalBlue. Since the hacking tool slipped into the world, it has been picked up by hackers in North Korea, Russia, and China, among other places. The tool has been used to allegedly create billions of dollars in damage... Read more...
When we last talked about about Snap back in March, it was rumored that the company would be launching a gaming platform in April. However, a new report of a much more negative nature is making the rounds that claims Snap employees have been using an internal tool to spy on users. The tool in question is called... Read more...
Smartphone security is becoming more sophisticated by the day. Fingerprint scanning and facial recognition schemes are starting to supplant PIN codes and passwords, but have you wondered what the next frontier might be? One possible avenue is behavioral biometrics, and a company called UnifyID is leading the... Read more...
Enterprise-class solid state drives used to be rare beasts that commanded heavy price premiums over their more common, consumer oriented counterparts. As leading SSD and Flash memory manufacturers have evolved their processes and technologies, however, availability and pricing for many enterprise-class solid... Read more...
If you try to market a product as “unhackable,” it stands to reason that someone is going to attempt to hack your device to knock you down a peg or two. That is exactly what happened with eyeDisk, which was first brought to light last year with a successful Kickstarter campaign. eyeDisk was able to raise over... Read more...
One of the hallmark features of Samsung’s new Galaxy S10, Galaxy S10+and Galaxy S10 5Gsmartphones are their use of in-display ultrasonic fingerprint readers. These newfangled sensors replace the tried and true optical fingerprint sensors that have been positioned on the backs of Samsung flagships for the past few... Read more...
Is your data secure? Researchers recently discovered a new variation of the Bleichenbacher oracle attack that could threaten TLS 1.3 encryption. Seven researchers discovered that OpenSSL, Amazon s2n, MbedTLS, Apple CoreTLS, Mozilla NSS, WolfSSL, and GnuTLS utilized TLS protocols vulnerable to attacks. Google's new... Read more...
The brain is the most complex organ in the body and the most difficult to unravel. Scientists have developed a variety of ways to better understand the brain, including the use of supercomputers. The world’s largest neuromorphic supercomputer, the Spiking Neural Network Architecture (SpiNNaker), was just switched on... Read more...
Samsung has become somewhat of a household name in the consumer solid state drive market—between its Pro and Evo drives, the company offers some of the fastest and best bang-for-buck options out there. Its newest SSDs, however, are aimed at data center customers and consist of several new models aimed at reducing the... Read more...
Until recently, a remote code execution vulnerability in Steam sat unnoticed by Valve for at least a decade, leaving millions of users at risk of attack. Luckily for all involved, it seems that malicious actors were not privy to the security bug either. Valve has since released a patch that partially addresses the... Read more...
The Apple iPhone has become so common with both upstanding citizens and nefarious criminals that law enforcement frequently is faced with trying to unlock the devices of people who are suspects in crimes to gather evidence. For suspects that are deceased, gathering evidence can be a challenge for law enforcement... Read more...
Back in late 2017, Seagate gave us a taste of what's to come with its multi-actuator technology for modern hard drives. Whereas today's hard drives use a single actuator to sweep across the spinning platters, Seagate actually uses two actuators that move independently around a single pivot point, potentially doubling... Read more...
Security researchers at Kaspersky Lab have discovered a rather nasty malware strain that has been hiding in certain wireless routers for over half a decade. Called Slingshot, the security researchers who discovered the malicious code believe the malware is part of a sophisticated cyberespionage campaign. The... Read more...
For the last few years, flagship smartphones have gotten thinner and sleeker and have dedicated a much larger percentage of their front surface to the screen. Back in 2011, for example, the front surface of a Samsung Galaxy S2 was 64% screen, whereas the front of today’s Galaxy S8 is 84% screen. There are many more... Read more...
First ... Prev 3 4 5 6 7 Next