Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Security researchers this week dropped a bombshell on pretty much everyone who owns a computer, saying there are inherent flaws in modern processors that could allow an attacker to access sensitive information, including passwords and other contents stored in what's supposed to be protected memory. At first it was... Read more...
We are only months removed from the massive WannaCry cyberattack that hit hundreds of thousands of computers in over 150 countries, crippling some hospitals in the United Kingdom. WannaCry became an overnight global scare after spreading far and wide within the first few hours. Up until now, it was not clear where... Read more...
Though encryption and enterprise products often go hand-in-hand, that is not always the case. There are some instances where encryption is not needed, and so Toshiba answered the call with a line of non-encrypted solid state drives optimized for data centers. Those drives are now starting to ship in select NetApp... Read more...
When it comes to the global computer storage market, it appears that Toshiba is demonstrating strong gains in a sector that is dominated by the likes of bellwethers like Seagate and Western Digital, which appeared previously to be the last standing competitors in an arena with heavy consolidation. However, not only... Read more...
A hacker has discovered a way to permanently disable the built-in Messages app on any Apple device running iOS 8 through iOS 10. That pretty much covers every iPhone handset and iPad tablet out there, including the recently released iPhone 7 and iPhone 7 Plus, save for models that are woefully outdated for whatever... Read more...
Remember getting Rickrolled? Talk about an annoying trend, but at least you could exit out of the 1980s hit single and resume normal activities (except for those dancing webpages on the desktop designed to dodge your exit attempts). Well, there's a new prank going around, one that can crash any iPhone handset in a... Read more...
Twitter needs to get a handle on its Promoted Tweets feature and it needs to do it quickly. The problem has to do with vetting, or lack thereof. We don't know how widespread the problem is, but there is at least one Promoted Tweet going around that is nothing more than a phishing scam preying on the desire of Twitter... Read more...
The battle between the FBI and locked phones is far from over. The FBI is currently trying to crack into another locked iPhone that once belonged to a now deceased terrorist. The iPhone in question belonged to Dahir Adan, who stabbed ten people in a Minnesota mall before a police officer shot and killed him. ISIS has... Read more...
Researchers from Keen Security Lab in China discovered and demonstrated a vulnerability in Tesla's Model S vehicles that could allow a remote hacker to fiddle with various controls, everything from opening the moon roof and adjusting the power seats to even applying the brakes. The security outfit shared its findings... Read more...
Two 18-year-olds from Israel find themselves in hot water with the United States Federal Bureau of Investigation (FBI) for their alleged roles in running a lucrative attack service called vDOS. They're said to have earned over $600,000 in the past two years by helping customers coordinate over 150,000 Distributed... Read more...
You might think that logging out of your PC before leaving it unattended for a short time is relatively safe, but you'd be wrong. A security engineer at R5 Industries demonstrated how incredibly easy it is to swipe the login credentials of a locked Mac or Windows PC using just a $50 USB device that's available to... Read more...
At this point we've reviewed quite a few high-end AC routers, including tri-band routers, flagship dual-band models, and even the latest MU-MIMO devices too. However, the one portion of the market we haven't covered much is the one that exists on the more affordable end of the pricing spectrum. We all know there are... Read more...
When The Washington Post posted a story about the "secret life" of TSA bag handlers, it thought it'd spice up its presentation with a neat shot of master baggage keys being spread in someone's hand like a fan. As it happens, that was unwise, as when it comes to standard keys like those used for baggage, all that's... Read more...
A couple of months back (Yes, I’m tardy in reporting. Life gets in the way sometimes.), I was invited to CDW’s headquarters in Vernon Hills, IL for a “red carpet tour” of their facilities to get a firsthand look inside the computer and tech products distributor and reseller giant. The facility is located about 40... Read more...
Target has reportedly reached a settlement agreement in which it will pony up $10 million as compensation to victims of a massive security breach in 2013. The proposed settlement has to be approved by a federal district court judge, and if it is, individual victims of the data breach could receive up to $10,000 in... Read more...
Earlier this month, I had the opportunity to tour Carnival's CSMART facility in Almere, the Netherlands. This facility is one of a handful in the world that can provide both extensive training and certification on cruise ships as well as a comprehensive simulation of what it's like to command one. Simulating the... Read more...
Avast, makers of the self-titled free antivirus software (along with paid Internet security suites), has discovered that the "Tinba Banker" Trojan is back in circulation, and this time it's targeting more than two dozen financial institutions in the United States. There are some big names among them, including Bank of... Read more...
It's time to say 'goodbye' to TrueCrypt, the popular open-source full disk encryption software, which was abruptly shut down earlier this week by the anonymous developers who built the program. According to a message on TrueCrypt's website, the software is no longer secure and may contain unfixed security issues. "The... Read more...
When NVIDIA first announced that it would create a workstation-class remote virtualization system that enabled full GPU acceleration with latency-free streaming I was more than a little skeptical. Not only did it seem like a solution in search of a problem, the bandwidth requirements and technical heavy-lifting to support professional PC users... Read more...
Security outfit Trend Micro is warning Android users that a recently discovered vulnerability in Google's open-source platform could allow cybercriminals to do "substantial damage" on smartphones and tablets. By exploiting the vulnerability, a hacker could effectively put an Android device in an endless reboot loop... Read more...
The good news for Target and its customers is that the retailer’s robust IT system detected the massive holiday season hack that affected tens of millions of accounts before it ever happened. The bad news is that Target failed to act on that detection, and the rest is history. According to Bloomberg, Target’s security tools detected... Read more...
It's with panels like Glenn Greenwald's that makes me regret not making it down to the SXSW festival in Austin, Texas. At this particular event, NSA whistleblower Edward Snowden was broadcast from Russia to answer a number of questions that Twitter users had for him, and in the end, one of the biggest things to take... Read more...
First ... Prev 2 3 4 5 6 Next