Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Security researchers have discovered a way to thwart almost every antivirus program using a "unique but simple method" involving directly junctions and symlinks. Antivirus software that falls prey to this kind of attack essentially attack themselves by deleting files critical to the program's operation, leaving users... Read more...
It appears as though even malware authors are going a little stir crazy during this time of recommended isolation. One of the newest PC infections making the rounds is a nasty piece of 'wiper' malware that effectively locks victims out of their computers, and displays a message giving false credit for the infection to... Read more...
There’s no question that the Tesla Model 3 is one of the most advanced cars on the planet, thanks in part to its advanced EV powertrain, its heavy use of powerful computers for its Autopilot self-driving system, and its heavy software integration with numerous vehicle functions. Tesla is also a leader in the industry... Read more...
Security researchers are sounding the alarm on a vulnerability present in practically every processor Intel has released in the past five years. According to the researchers, the vulnerability is "impossible to fix" and "jeopardizes everything Intel has done to build the root of trust and lay a solid security... Read more...
As with many things in life, when it comes to mobile app security, you win some and you lose some. So it goes for Google and its Play Store. A new 2019 Mobile App Thread Landscape Report put together by RiskIQ pegs the Play Store as being the second most dangerous place to download apps, in terms of the number of... Read more...
WhatsApp is popular because its end-to-end encryption gives users warm fuzzies over the privacy and security of their chats. However, the chat messaging application might not be quite as secure or private as you thought (or at least that was the case). That's because Google had been indexing links to group chats... Read more...
Well, this is disturbing. Russian security researcher Vladislav Yarmak is warning of a backdoor that exists in firmware for digital video recorder (DVR) and network video recorder (NVR) powered by HiSilicon system-on-chip (SoC) hardware. This is a zero-day vulnerability that could allow an attacker to gain root access... Read more...
President Donald Trump has butted heads with the US Federal Bureau of Investigation (FBI) in the past, but when it comes to  use of encryption on iPhone handsets, he is squarely in the FBI's corner. Both he and the FBI want Apple to build a backdoor into iOS that would allow law enforcement officials to access locked... Read more...
Anyone who uses WhatsApp—and many people do, with the developers claiming 1.5 billion monthly active users—should make sure they have the latest version installed. Otherwise, they could be susceptible to a critical vulnerability that could allow hackers to infiltrate their text messaging conversations, pictures, and... Read more...
A remote desktop exploit in Windows known as BlueKeep is no joke, and to prove it, security researchers at Sophos have created a proof-of-concept demonstration showing how easy it would be for an unpatched RDP (Remote Desktop Protocol) server to be compromised. The researchers hope that the demonstration will... Read more...
Huawei will once again be allowed to purchase parts and components from US suppliers, including Intel and Qualcomm, after President Donald Trump announced that he is lifting the ban on the Chinese telecom. The decision was made after he met with China's president over the weekend. It also calls into question if the... Read more...
A widely used banking Trojan that has been wreaking havoc in the wild for over a decade has developed a new ability. Called Qakbot (or Qbot for short), the Trojan has been found to be using an updated persistence mechanism that can make it more difficult for users to detect and subsequently remove from infected... Read more...
Fraudulent apps on the Google Play store are a huge problem for Android users. Some of the fraudulent apps aim to steal money and other information. In February this year, word surfaced that a cryptocurrency-stealing malware had been found on Google Play, while malware-laden game apps were found last November that... Read more...
CT scans are essential tools that help medical practitioners detect various medical conditions. Healthcare providers rely on the accuracy of these technologies, because a misdiagnosis could prove fatal. Unfortunately, this vital technology is vulnerable to hackers. Researchers recently designed malware that can add or... Read more...
Privacy is a big issue for users of the social network Facebook. The company has been called out for violating the privacy of users multiple times and faces fines that could be in the billions from the FTC. While Facebook will shutter one of its apps for privacy issues, called Onavo, there are still multiple... Read more...
One of the cool features of the Tesla Model 3 is that it supports a phone key that allows you to give access to a car to friends or family so they can unlock and start it without a key. The phone key feature is also used by a rental car company out of Minnesota called Trevls. The company has announced that a thief was able to walk up to one Read more...
AMD has had some great momentum since it unleashed its first Zen-based processors to market early last year. A little while later, we saw EPYC hit the enterprise market and Threadripper hit soon thereafter, to cater to high-end enthusiasts and workstation users. Recently, the company followed-up its initial Ryzen... Read more...
Cyber thieves may have stolen personal data of 90,000 people from two of the largest banks in Canada, including Bank of Montreal and Imperial Bank of Commerce. The banks are in the process of verifying the theft after the supposed culprits notified the financial institutions over the weekend that they were in... Read more...
Security researchers from the University of Michigan and Zhejiang University in China have published a paper on an acoustic attack vector that could crash a mechanical hard drive, leading to damage for both the hardware and software. The attack does not require fancy equipment, either—an attacker could use regular... Read more...
An app designed to help parents spy on monitor their teenager's mobile phone activities has come under additional scrutiny for leaking account information of tens of thousands of parents and children. The app is called TeenSafe and it allows parents to look over their child's shoulder, at least as it pertains to... Read more...
Normally when you think about ransomware you think about something clearly malicious such as Petya and others. You could get your files back if infected with Petya, but the hackers wanted $300 in bitcoin to do it. A new kind of ransomware, however, is making the rounds and this variant is based on the game PUBG... Read more...
Tinder is a popular dating app that matches people up using swipes. If you thought that all the people you were swiping left or right on were private and only you and the people you swiped knew about them, you might be wrong. Security researchers have found a flaw that could allow those swipes to be captured and... Read more...
Prev 1 2 3 4 5 Next