Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Security researchers have discovered a way to thwart almost every antivirus program using a "unique but simple method" involving directly junctions and symlinks. Antivirus software that falls prey to this kind of attack essentially attack... Read more...
It appears as though even malware authors are going a little stir crazy during this time of recommended isolation. One of the newest PC infections making the rounds is a nasty piece of 'wiper' malware that effectively locks victims out of... Read more...
There’s no question that the Tesla Model 3 is one of the most advanced cars on the planet, thanks in part to its advanced EV powertrain, its heavy use of powerful computers for its Autopilot self-driving system, and its heavy software... Read more...
Security researchers are sounding the alarm on a vulnerability present in practically every processor Intel has released in the past five years. According to the researchers, the vulnerability is "impossible to fix" and "jeopardizes... Read more...
As with many things in life, when it comes to mobile app security, you win some and you lose some. So it goes for Google and its Play Store. A new 2019 Mobile App Thread Landscape Report put together by RiskIQ pegs the Play Store as being... Read more...
WhatsApp is popular because its end-to-end encryption gives users warm fuzzies over the privacy and security of their chats. However, the chat messaging application might not be quite as secure or private as you thought (or at least that... Read more...
Well, this is disturbing. Russian security researcher Vladislav Yarmak is warning of a backdoor that exists in firmware for digital video recorder (DVR) and network video recorder (NVR) powered by HiSilicon system-on-chip (SoC) hardware... Read more...
President Donald Trump has butted heads with the US Federal Bureau of Investigation (FBI) in the past, but when it comes to  use of encryption on iPhone handsets, he is squarely in the FBI's corner. Both he and the FBI want Apple to build... Read more...
Anyone who uses WhatsApp—and many people do, with the developers claiming 1.5 billion monthly active users—should make sure they have the latest version installed. Otherwise, they could be susceptible to a critical vulnerability that could... Read more...
A remote desktop exploit in Windows known as BlueKeep is no joke, and to prove it, security researchers at Sophos have created a proof-of-concept demonstration showing how easy it would be for an unpatched RDP (Remote Desktop Protocol)... Read more...
Huawei will once again be allowed to purchase parts and components from US suppliers, including Intel and Qualcomm, after President Donald Trump announced that he is lifting the ban on the Chinese telecom. The decision was made after he... Read more...
A widely used banking Trojan that has been wreaking havoc in the wild for over a decade has developed a new ability. Called Qakbot (or Qbot for short), the Trojan has been found to be using an updated persistence mechanism that can make it... Read more...
Fraudulent apps on the Google Play store are a huge problem for Android users. Some of the fraudulent apps aim to steal money and other information. In February this year, word surfaced that a cryptocurrency-stealing malware had been found... Read more...
CT scans are essential tools that help medical practitioners detect various medical conditions. Healthcare providers rely on the accuracy of these technologies, because a misdiagnosis could prove fatal. Unfortunately, this vital technology... Read more...
Privacy is a big issue for users of the social network Facebook. The company has been called out for violating the privacy of users multiple times and faces fines that could be in the billions from the FTC. While Facebook will shutter one... Read more...
One of the cool features of the Tesla Model 3 is that it supports a phone key that allows you to give access to a car to friends or family so they can unlock and start it without a key. The phone key feature is also used by a rental car company out of Minnesota called Trevls. The company has... Read more...
AMD has had some great momentum since it unleashed its first Zen-based processors to market early last year. A little while later, we saw EPYC hit the enterprise market and Threadripper hit soon thereafter, to cater to high-end enthusiasts... Read more...
Cyber thieves may have stolen personal data of 90,000 people from two of the largest banks in Canada, including Bank of Montreal and Imperial Bank of Commerce. The banks are in the process of verifying the theft after the supposed culprits... Read more...
Security researchers from the University of Michigan and Zhejiang University in China have published a paper on an acoustic attack vector that could crash a mechanical hard drive, leading to damage for both the hardware and software. The... Read more...
An app designed to help parents spy on monitor their teenager's mobile phone activities has come under additional scrutiny for leaking account information of tens of thousands of parents and children. The app is called TeenSafe and it... Read more...
Normally when you think about ransomware you think about something clearly malicious such as Petya and others. You could get your files back if infected with Petya, but the hackers wanted $300 in bitcoin to do it. A new kind of ransomware... Read more...
Tinder is a popular dating app that matches people up using swipes. If you thought that all the people you were swiping left or right on were private and only you and the people you swiped knew about them, you might be wrong. Security... Read more...
Prev 1 2 3 4 5 Next