Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Skype has announced something that some users have wanted for a long time: end-to-end encryption for conversations. Skype Insiders can preview the new encryption feature right now, and it's called Private Conversations. With these conversations, end-to-end encryption for audio calls, text messages, images, audio... Read more...
Malware writes are a shifty bunch. If anyone needs further proof of that, Symantec has it, in the form of a warning over a new Android "Fakeapp" malware variant that spoofs Uber, the popular ridesharing service, to cover its tracks. While it may look innocent, the Fakeapp malware pulls its usual dirty tricks... Read more...
A new study has found something very disturbing on some of the top websites in the world. Researchers from the Princeton Center for Information Technology Policy have conducted research that found that over 400 of the top 50,000 websites in the world are using "session replay scripts" to track user behavior. This... Read more...
Equifax may be now getting its public lashings for a cybersecurity breach that resulted in personal information of 143 million Americans being exposed to hackers, but it appears that the Securities and Exchange Commission (SEC) has a few skeletons in its closet as well. The regulatory agencies announced late last... Read more...
For a long time, Apple's Mac line of computers were thought by some users to be immune to malware and viruses. Some of that was due to hackers and nefarious sorts aiming for the low hanging fruit of the much larger Windows user base. Things have changed with Macs growing in popularity over the years and there are many... Read more...
Many technology companies have in place bug bounty programs that reward security researchers who submit discovered vulnerabilities in the products and services they offer. It is a win-win proposition in which technology companies are alerted to potentially crippling security holes, and hackers are compensated for... Read more...
We took part in an interesting demo this week that was both eye-opening and somewhat alarming. We met with representatives from Synaptics to discuss what we thought would be its latest sensor technology or HCI device, but were treated to a real-world hacking display that would leave most people slack-jawed. Why, you... Read more...
The Internet community was able to breathe a temporary sigh of relief after a 22-year-old security researcher accidentally discovered a way to thwart WannaCrypt, a fast-spreading strain of malware that was stolen from the National Security Agency. After reaching tens of thousands of systems in over 70 countries within... Read more...
For whatever reason, Samsung had only been doling out security updates to unlocked Galaxy devices every three months in the United States. Given the growing threat landscape and attention being paid to mobile, that meant a Galaxy device owner could conceivably wield an insecure device for a quarter of a year, leaving... Read more...
Take a look at your printer. Give it a good stare. Do you trust it? Probably not, considering it jammed the last time you had to print an important paper right up against a deadline. However, what if we told you that your printer just has to sit there on your network to be a very serious security problem? HP Inc... Read more...
It's no secret that Apple places a high value on customer security and privacy, and the company goes to great lengths to make sure that it's a market-leader in both regards. However, even the most careful companies can be exposed to crippling security vulnerabilities. If software contains a previously unidentified bug... Read more...
A cloud security outfit is warning that a new ransomware strain called Stampado has emerged from the underground market and is wreaking havoc on systems. What makes Stampado stand out from the crowd is that it is available on the dark web for only $39 with a full lifetime license. That makes it one of the least... Read more...
Security researchers have found a rather alarming vulnerability in Linux that could ultimately allow an attacker to copy, modify, or destroy the contents of a hard drive, along with with configure the network to exfiltrate data. That in and of itself is cause for concern, but the real harrowing part about this is how... Read more...
You might think that storage makers are 100 percent focused on solid state drives these days, but that isn't the case. Mechanical hard disk drives (HDDs) still offer the best price-per-gigabyte ratio for bulk storage duties, and to keep things going, Seagate today announced its Enterprise Performance 15K HDD v6 in... Read more...
When most people buy a sex toy, they're usually not too overt about it. In fact, the mere thought of someone intercepting that package on your doorstep and noting what might be inside is something that could cause serious embarrassment. Sex is unquestionably one of the most private things to most people, so when one... Read more...
If you thought that Samsung’s monstrous 15.3TB PM1633a SAS solid-state drive (SSD) was impressive, you ain’t seen nothing yet. Seagate strutted into the Flash Memory Summit this week touting a new SAS SSD that offers four times the storage capacity of the PM1633a — that’s right, this new enterprise-class SSD has a... Read more...
If you're a SwiftKey user and have been experiencing some oddities lately: you're not alone. Due to a bug, some SwiftKey users have been receiving some downright bizarre recommendations, including phrases that they never use. Even worse? The software also predicted names and email addresses of other users! Once... Read more...
Any way you look at it, today's storage technologies are impressive. We can hold a tiny memory card no larger than our finger nails that can fit thousands of images, songs, and documents, and potentially hundreds of videos. We even just wrote about a new consumer hard drive from Seagate that packs 10 terabytes inside... Read more...
There are two things that Samsung really wants: to be one of the first to deploy a city-wide IoT infrastructure, as well as make sure that IoT infrastructure is on its home turf, in South Korea. That will soon be happening, and it's sure to be one of the first of what will become many such roll-outs over time. For... Read more...
Slack, the popular real-time messaging tool, is making it easy for users to register with and log into other services and applications. It's doing that through "Sign in with Slack," a feature that ties a person's Slack account to external services so they can use their same login information. Sounds familiar, doesn't... Read more...
Someone posted a list to Pastebin containing compromised account credentials belonging to a relatively small number of Spotify users. The list, which is few hundred names deep, contains usernames, passwords, emails, account type, and other details, seemingly suggesting the site has been hacked. The accounts appear... Read more...
It's no secret that law enforcement agencies and governments at large want to have access to our personal data whether we like it or not. Hot on the heels of the FBI managing to bypass security measures that should have protected the data on a terrorist's iPhone 5c, we see that the case is definitely not closed. As... Read more...
First ... Prev 4 5 6 7 8 Next