Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Security researchers say millions of Android phones are susceptible to a newly discovered vulnerability that, if exploited, could allow an attacker to spy on users through the phone's microphone, take photos with the phone's camera, read... Read more...
Using a screen protector is a common way to help prevent smartphone displays from getting scratched, scuffed, or even shattered. On the Galaxy S10 series, however, it's been discovered that a screen protector can inadvertently prevent the... Read more...
At the CS3sthlm security conference in Stockholm, Sweden later this month, security researcher Monta Elkins, the "Hacker-in-Chief" at FoxGuard Solutions, will demonstrate a proof-of-concept hardware hack involving spy chips implanted onto... Read more...
The latest “Joker” spyware is no laughing matter as it can easily compromise a lot of the personal data you keep on your phone. Researchers recently discovered spyware that can access your SMS messages, contact list and other information... Read more...
Samsung's Galaxy Note series of large format Android smartphones has never been about compromise. The pen-wielding, hybrid devices have always been bigger, more powerful and more capable with larger batteries and as many bells, whistles... Read more...
A significant security issue with a popular Mac video conferencing company Zoom has surfaced. The security issue was made public by a researcher named Jonathan Leitschuh after a 90-day grace period to give Zoom time to fix the problem. The... Read more...
It is often recommended that one of the best ways to avoid malware on mobile devices is to stick with established, reputable app stores. The two big ones are Google's Play Store and Apple's App Store, for Android and iOS, respectively. But... Read more...
It is common knowledge that websites like to track your activity through cookies, but might we be giving up a bit too much privacy when surfing the web? The answer may depend on the specific browser you are using. In a recent examination... Read more...
With good intentions, Samsung took to Twitter to remind smart TV owners to scan their televisions for malware, and the Internet reacted about as you would expect. Snarky and indignant replies followed, and of course so did the jokes. And... Read more...
Back in 2017, the National Security Agency (NSA) lost control of one of its hacking tools called EternalBlue. Since the hacking tool slipped into the world, it has been picked up by hackers in North Korea, Russia, and China, among other... Read more...
When we last talked about about Snap back in March, it was rumored that the company would be launching a gaming platform in April. However, a new report of a much more negative nature is making the rounds that claims Snap employees have... Read more...
Smartphone security is becoming more sophisticated by the day. Fingerprint scanning and facial recognition schemes are starting to supplant PIN codes and passwords, but have you wondered what the next frontier might be? One possible avenue... Read more...
Enterprise-class solid state drives used to be rare beasts that commanded heavy price premiums over their more common, consumer oriented counterparts. As leading SSD and Flash memory manufacturers have evolved their processes and... Read more...
If you try to market a product as “unhackable,” it stands to reason that someone is going to attempt to hack your device to knock you down a peg or two. That is exactly what happened with eyeDisk, which was first brought to light last year... Read more...
One of the hallmark features of Samsung’s new Galaxy S10, Galaxy S10+and Galaxy S10 5Gsmartphones are their use of in-display ultrasonic fingerprint readers. These newfangled sensors replace the tried and true optical fingerprint sensors... Read more...
Is your data secure? Researchers recently discovered a new variation of the Bleichenbacher oracle attack that could threaten TLS 1.3 encryption. Seven researchers discovered that OpenSSL, Amazon s2n, MbedTLS, Apple CoreTLS, Mozilla NSS... Read more...
The brain is the most complex organ in the body and the most difficult to unravel. Scientists have developed a variety of ways to better understand the brain, including the use of supercomputers. The world’s largest neuromorphic... Read more...
Samsung has become somewhat of a household name in the consumer solid state drive market—between its Pro and Evo drives, the company offers some of the fastest and best bang-for-buck options out there. Its newest SSDs, however, are aimed... Read more...
Until recently, a remote code execution vulnerability in Steam sat unnoticed by Valve for at least a decade, leaving millions of users at risk of attack. Luckily for all involved, it seems that malicious actors were not privy to the... Read more...
The Apple iPhone has become so common with both upstanding citizens and nefarious criminals that law enforcement frequently is faced with trying to unlock the devices of people who are suspects in crimes to gather evidence. For suspects... Read more...
Back in late 2017, Seagate gave us a taste of what's to come with its multi-actuator technology for modern hard drives. Whereas today's hard drives use a single actuator to sweep across the spinning platters, Seagate actually uses two... Read more...
Security researchers at Kaspersky Lab have discovered a rather nasty malware strain that has been hiding in certain wireless routers for over half a decade. Called Slingshot, the security researchers who discovered the malicious code... Read more...
First ... Prev 3 4 5 6 7 Next