Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Target on Thursday confirmed reports that hackers gained access to credit and debit card data during the holiday shopping season. According to Target, around 40 million payment card accounts may have been impacted between November 27 and December 15, 2013. That time frame falls right in the midst of the some of the... Read more...
One of the most frustrating things on earth is being censored, and if there's one group that likes to be vocal in battling such things, it's The Pirate Bay. Censorship can come in many forms, however, such as restricting what you can say in public, or which websites you can visit. TPB might not be able to take care of... Read more...
A new report (albeit from unnamed industry sources, not Edward Snowden) alleges that the government has used the broad powers granted it by the Patriot Act to demand broad information about a user's passwords, website security, and even encryption information from service providers. The benefits of having this type of... Read more...
Twitter has had more than its share of security breaches on its accounts of late, from the Wall Street Journal and New York Times to CBS to Burger King and Jeep, and now the social platform is addressing security by rolling out login authentication. In a blog post, Twitter’s product security team said, “We... Read more...
I'm sure it comes as a surprise to no one that Google is a great place to find some questionable items online, whether it's malware, exploits, someone belly-flopping a pool of ice - whatever. However, even with as much as what Google offers, there are many things that the company doesn't track and publish online. For... Read more...
Just because an attack is bizarre doesn’t mean it isn’t dangerous. According to security researcher Brian Krebs (pictured), the FBI and Department of Homeland Security (DHS) posted a security bulletin concerning TDoS (telephony denial-of-service) attacks on PSAPs (public safety answering points). “Information received from... Read more...
Concerned that hacking is on the rise? You've every right to be worried. Following recent reports from The Wall Street Journal and The New York Times surrounding intrusion from outside forces into their news systems and e-mail databases, Twitter has now affirmed a security puncture of its own. The company released a blog post noting that it... Read more...
Have you ever found yourself caught in a Captcha loop? It's where you do your best to decipher strings of text that sometimes look like a bunch of hieroglyphics, only to get it wrong over and over again until finally, you punch in the correct characters and are granted to access to a site you're now too frustrated to visit. Even more annoying... Read more...
According to the latest McAfee Threats Report, the threat of malware is stronger than it has been in the last four years. The McAfee Threats Report for the Second Quarter 2012 found an increase in malware compared to the first quarter of this year (which was previously rated as the busiest period in recent history). This increase is significant:... Read more...
Considering a career change? You may want to see if Dunder Mifflin is hiring. A piece of malware first discovered in 2010 is making the rounds, and it's wreaking havoc on thousands of office printers, resulting in pages of "garbled printouts" and reams of wasted paper. It's a "paper saleman's dream come true," Symantec says. Trojan.Milicenso,... Read more...
Security researchers have discovered that iOS devices have been saving the locations of users' devices at regular intervals, and storing them in an unencrypted, though hidden file. The data includes locations and time stamps, and is apparently intentional: the database is backed up, and restored across backups, and... Read more...
In the wake of the pair of thwarted bombings by Al Qaeda last month, the TSA has announced additional restrictions and guidelines for passengers traveling both within the United States and internationally. In additional to logical and prudent steps, such as banning packages from Somalia and Yemen (temporarily) and... Read more...
Data security is a top concern for many businesses. In addition to the need to control and secure data on computers and mobile PCs, companies also realize the importance of sensitive data that is stored on the hard disk drives within copier and printer systems. To help companies secure this data, Toshiba has developed... Read more...
Here's a little known fact: Twitter and Facebook are erupting in popularity. Both social networks have taken the underground and mainstream worlds by storm, and everyone from your next door neighbor to your favorite celebrity is likely within reach. This new world of information can be extremely beneficial; having real-time updates to breaking... Read more...
Although the worldwide economy may be shrinking, our needs as consumers to store large amounts of data continues to grow at a breakneck pace. Whereas only a few years ago it was uncommon for most PC users to have more than just a few digital images or media files, today virtually every aspect of our lives has some sort of digital component.... Read more...
For the third time this year, Twitter was the victim of a security breach that stemmed from a simple attack. In the most recent case, a hacker simply guessed an employee’s personal email account password and then worked from there to steal confidential company documents. This most recent attack brings to light some of the problems associated... Read more...
Toshiba’s Self-Encrypting Drive Technology will make its debut at the RAS conference in San Francisco. The conference begins April 21st. The new technology supports the Trusted Computing Group (TCG) Storage Architecture Core Specification, as well as the Storage Security Subsystem Class (SSC) Opal Specification. Toshiba’s encryption package... Read more...
TRENDnet Launches a High Performance Wireless N Internet Security Camera TORRANCE, Calif. -March 3, 2008-TRENDnet, a best-in-class wired and wireless networking hardware brand, today announces the launch of the Wireless N Internet Camera Server with 2-Way Audio, model TV-IP512WN, which offers unsurpassed wireless range and video streaming... Read more...
Security software company, AVG Technologies, reports that as many as 300,000 new, unique Websites launch every day, whose sole purpose is to infect visiting computers with malware. Not only has this number jumped up from as many as 200,000 only three months earlier, but many of these sites stay active for only a short period of time--sometimes... Read more...
TRENDnet, a best-in-class wired and wireless networking hardware brand, today announces the launch of the first-to-market 7” Wireless Internet Camera and Photo Monitor, model TV-M7. The world’s first 7” Wireless Internet Camera and Photo Monitor connects to your wireless network, detects wired and wireless TRENDnet Internet Security Cameras... Read more...
Apparently, Linux kernel creator, Linus Torvalds has no problem expressing his opinion, and did so vehemently via back-and-forth e-mails with the editors of Network World this week. What got Torvalds so heated is his perception of how security vulnerabilities are so incredibly over-hyped to the extent that he calls it a "security circus."... Read more...
As digital media increases in popularity, so will the demand for larger storage options, whether in the form of increased hard drives capacities or through the use of expandable network storage devices.  The last time we broached the topic of NAS was with our article on two impressive SOHO units from QNAP.  While not industrial... Read more...
First ... Prev 2 3 4 5 6 Next