Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Cybersecurity news can seem like a never-ending stream of new vulnerabilities and a single prevailing message: “make sure to patch your devices.” Nonetheless, this message bears repeating. While we may keep up with updates on devices that receive over-the-air (OTA) updates on a semi-regular basis, we can still forget... Read more...
Always be wary of installing apps on your mobile device, regardless of where that app comes from. Many people use their mobile devices for banking and other financial transactions, because they're always with us, always connected, and easy to use. Unfortunately, because of their ubiquity and ease of use, mobile phones... Read more...
Researchers say you should upgrade a popular WordPress plugin sooner than later, or else you could end up losing access to your website, and potentially your web server! If you exist on the internet, you likely know of or have seen at least one WordPress site. The content-management software is likely the most... Read more...
A security researcher who goes by the name “RyeLv” recently discovered an elevation of privilege vulnerability in Windows. Microsoft has publicly disclosed the vulnerability and registered it in the Common Vulnerabilities and Exposures (CVE) system with the name CVE-2022-21882. The National Institute of Standards and... Read more...
The Raspberry Pi is terrific for plenty of uses, from retro-style gaming to running an extremely low-cost server. A team of researchers have discovered another new use for Raspberry Pi: hands-off malware detection. While most virus and malware detection depends on file signatures and behaviors, this new project... Read more...
In the past, we have seen incidents of text messages being rerouted to steal two-factor authentication codes to breach peoples’ accounts. Now, criminal hackers are being more direct in potentially using SIM swap attacks by getting a carrier—in this case, T-Mobile—to switch a customer’s number to an attacker-controlled... Read more...
With data breaches and malware on the rise, millions are turning on two-factor authentication (2FA) to try and protect themselves from an attack. One of the most popular apps to use with 2FA, Google Authenticator, has just hit a very big milestone because of it. People have been bombarded with headlines about... Read more...
If you're a regular HotHardware reader, you probably make contactless payments now and again. You might even do it using Apple Pay, and if you live in a big city with mass transit, there's a decent likelihood that you have Express Transit enabled. If you use a Visa card for it, you may want to reconsider that based on... Read more...
Attention fellow iPhone users, if you have any precious photos nestled inside text messaging threads, be careful not to delete those threads, even if you have saved those photos to your camera roll. Otherwise, you risk losing those pictures forever. The culprit is a weird bug in iOS 15 and/or iCloud, and as of the... Read more...
T-Mobile came under fire after a recent data breach exposed the private data of nearly 50 million customers. Shortly after the attack was made public, T-Mobile issued a boilerplate public response confirming many of the incident's details. "We take our customers' protection very seriously and we will continue to work... Read more...
Earlier this week, it was alleged that T-Mobile suffered a devastating data breach that resulted in the leak of personal data from over 100 million customers. Today, T-Mobile confirmed the breach, but the number of affected individuals is less than half of what was previously reported. The confirmed 47 million... Read more...
T-Mobile is now investigating a massive customer data breach claim that could affect up to 100 million users. The leak, which appeared on a leak and database selling forums on Saturday, claimed to have 30 million unique social security numbers and driver's license information. In the samples provided, it also... Read more...
Hopefully you are not one of the millions of people who have installed an app called PIP Photo onto your Android device. Why is that? While it may seem like a harmless and handy image editing app, it contains malware designed to covertly swipe a person's login credential for Facebook. Same goes for a handful of other... Read more...
A barcode scanning app for Android with more than 10 million downloads under its belt has been found to be the culprit of unwanted ads and pop-ups when using the default browser. This was not the case prior to the developer dishing out an update in early December. But for some stupid reason, years of goodwill went... Read more...
How many times have you seen a horror movie where the villain and/or monster is defeated, only to rise back up after the heroes let their guard down? It is the blueprint for a boilerplate horror film, and it also describes what seems to be happening with Trickbot, a dastardly botnet that Microsoft and the US Military... Read more...
Private threat analysis and mitigation company, HYAS, is buying user data from phone apps to try to track hackers. A major side-effect of this, though, is that regular users are possibly being ensnared and HYAS claims they can track people to their “doorstep.” The collection of user data has long been a problem for... Read more...
The Chinese-owned social networking application TikTok has been the center of attention the last several weeks as President Trump has moved to ban the app and force the company to divest its United States operations. Many people sided with TikTok and were upset at President Trump for trying to take action against the... Read more...
If you want to show up at a LAN party like a boss, it's not enough to roll onto the scene with a set of headphones draped around your neck, a gaming mouse dangling over your shoulder, and an obnoxiously loud mechanical keyboard tucked under your arm while gripping a Monster energy drink in each hand. You won't stand... Read more...
Following a massive data breach earlier this week, Twitter now finds itself in the precarious position of balancing transparency with security. That's to say, Twitter has divulged some additional details about what happened and what steps it is taking in the aftermath, but is also keeping certain information close to... Read more...
Yesterday, we brought you news that the TikTok app has been doing some shady things behind the scenes with devices running iOS. Following the release of the first iOS 14 beta, it was discovered that TikTok was pinging the system clipboard constantly and pasting that data for its own use. Without the steady stream... Read more...
There's a new hardware exploit that's being brought to light courtesy of security researcher Björn Ruytenberg from the Eindhoven University of Technology. The security vulnerability affects devices equipped with Thunderbolt ports, and it's appropriately named Thunderspy. Before we get started, we should first let... Read more...
There are multiple ways to sneakily extract data from a PC, and not all of them involve directly tapping into the storage device. Even a PC that is not connected to a network is vulnerable. These are referred to as air gapped systems, and security researcher Mordechai Guri from Israel's Ben Gurion University of the... Read more...
Prev 1 2 3 4 5 Next