Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

If you're still rocking Windows XP, we admire your dedication and ability to squeeze over a decade of use out of an operating system you presumably purchased long ago (nobody pirates XP, right?), but the end is nigh if you care at all about security. Come April 2014, Microsoft will cease... Read more...
As the Internet has grown up before our very eyes, a bevy of security protocols have taken shape to protect its users from ill-willed computers and those who program them. It may sound a bit dystopian, but Google has been one of the... Read more...
Making money while running a social media service is difficult. Companies like Facebook and Twitter have struggled to monetize their platforms on both desktop and mobile, while striking balances that don't royally tick off users with... Read more...
After the revelations came forth of NSA spying this past summer, few companies jumped to action quite like Mozilla. Without much delay, the company patched-up a specific exploit in Firefox that the NSA had taken advantage of, and since... Read more...
Not long after the initial NSA leaks escaped Edward Snowden's head this past summer, a handful of tech companies assured their customers that personal information stored with them is secure. One such company is Apple, which went on the... Read more...
Up to now, viewability of kids’ Facebook accounts was set by default to “Friends of Friends”; now, those aged 13-17 start out with their audience set to “Friends” by default. However, they can also make their... Read more...
Following an eight-year stint as the man in charge of the U.S. National Security Agency (NSA), Army General Keith Alexander has decided to step down effective next March or April. So will his civilian deputy, John "Chris" Inglis, who is planning to retire by the end of the year. The NSA came... Read more...
This summer, company founder Ladar Levison shut down his secure email service, Lavabit, rather than comply with data requests from the NSA. There is a widespread assumption that Lavabit was the email service used by whistleblower Edward... Read more...
A hacker (“Craig”) on a site devoted to embedded device hacking posted a lengthy entry detailing how he, on a whim and armed with boredom and too much Shasta cola, reverse-engineered a firmware update and found a backdoor to... Read more...
In the famous words of a canine scholar best known for his research into unexplainable phenomenon, "Ruh roh!" That about sums up our reaction to the discovery that Google's popular Chrome browser may be storing sensitive data in such a way... Read more...
The issues of security and privacy should always be on our minds, but ever since the revelation of NSA spying played out this past summer, those issues have been forced to the forefront - impossible to avoid. In reality, that's a great... Read more...
You can make a fair bit of coin diving into code and rooting out vulnerabilities. In some instances, Microsoft will pay up to $100,000 for a single bug report, and Google's Vulnerability Reward Program routinely pays out thousands of... Read more...
Are you browsing this very article using a notebook? If so, the trackpad you're probably scrolling with most likely has Synaptics attached in some way. The company responsible for millions upon millions of laptop trackpads has just... Read more...
Looking for a career change? Consider becoming a professional bug hunter. Don't worry, it's not as gross as it sounds. We're talking about software bugs, such as pieces of code with unintended consequences or underlying security... Read more...
Payback? Perhaps. With the National Security Agency in the wrong kind of spotlight of late, this is probably sweet for many to read. What's being described as "chronic electrical surges" at an NSA data-storage facility have "hundreds of... Read more...
You probably carry with you or have at home a USB thumb drive filled with malware removal tools and other security software. After all, once word gets out that you know a thing or two about computers, the requests from family and friends... Read more...
In an effort to make online shopping and authentication more secure and less reliant on passwords, an increasing number of companies are joining the FIDO Alliance, which among other things is pushing for the use of fingerprint scanning... Read more...
Given the revelations of the NSA’s data-gathering program coupled with the fact that if you use essentially any Internet services your data is out there and capable of being mined, more users than ever are looking for ways to thwart... Read more...
The average Internet user probably has no idea what "Tor" is. If you're one of those users, you've probably had no good reason to even investigate what it is, what it does, or how it hides. But if you're the NSA, you're acutely aware of Tor, and a new report suggests that both the NSA and GCHQ... Read more...
Adobe is trying to downplay a recent security breach by saying that "cyber attacks are one of the unfortunate realities of doing business today," and even though that might be true, it's unlikely to provide comfort to the 2.9 million... Read more...
During an interview at the San Jose McEnery Convention Center this past weekend, antivirus software founder John McAfee touted a new invention that he's planning to launch as soon as possible. It's called D-Central, and based on that name... Read more...
Information about the NSA's data gathering efforts continues, with newly-released information of the agency's efforts on the social networking front. It's already been revealed that the NSA gathers information from many different sources... Read more...
First ... Prev 103 104 105 106 107 Next