Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Solutions that enable access to remote devices for security purposes are far from uncommon, but what is uncommon is having the functionality built right into the device, and especially with a solution that's simple to take advantage of. With a recent update to its Android Device Manager... Read more...
While perhaps a bit unnerving, let's not act like this hasn't happened before. While Apple's engineering team is no doubt massive, there's only so much a fixed group can find. We're talking about bugs in particular; while iOS 7's final... Read more...
Hot on the heels of news that a crowdfunded competition aims to figure out if the fingerprint security implementation on Apple's iPhone 5s can be exploited comes news of a proven security risk, squarely involving iOS 7. The exploit specifically involves the lockscreen, the most common piece of... Read more...
When Apple unveiled its iPhone 5C and 5S last week, one of the standout features belonged to the latter: Fingerprint security. In effect, instead of having to type in a quick password to gain access to your phone, the built-in fingerprint... Read more...
Following the initial leaks against the NSA by Edward Snowden this past summer, there was speculation that what was being exposed would end up hurting the business of US-based tech companies overseas. It's easy to understand why - when... Read more...
The train carrying a vast amount of NSA confidential information continues to trek along today, with a revelation that the government agency conducted man-in-the-middle (MITM) attacks involving a couple of the Web's largest companies... Read more...
Microsoft may need to take yet another mulligan on more Patch Tuesday updates that, for some, are causing more problems than they purport to fix. The latest round of updates were supposed to address 14 security flaws, though some users are... Read more...
Over the past few months, as the Snowden leaks have exposed increasing levels of detail about the scope and nature of the NSA's "oversight" of the Internet, there's been a great deal of discussion on how users can protect themselves. The... Read more...
TRENDnet, a maker of home networking and security products, has agreed to settle charges brought on by the Federal Trade Commission (FTC) alleging that its "lax security practices" left consumers susceptible to remote viewing by hackers... Read more...
If you’ve been avoiding signing up for Google’s two-token authentication system because you thought the inconvenience outweighed the extra security for your Google account, you’re probably feeling pretty smug about now... Read more...
Samsung has previously rolled out a mobile security solution with KNOX, which is for Android devices and has been marketed to enterprises, primarily aimed at enhancing security amidst the BYOD trend. Earlier this year, KNOX was deemed a... Read more...
Yesterday, we reported that two security researchers successfully reverse-engineered Dropbox, intercepting SSL traffic and bypassing its two-factor authentication. The duo that did it, Dhiru Kholia and Przemyslaw Wegrzyn, wrote a paper on the process and said that although Dropbox has been... Read more...
The typical smartphone contains a wealth of information, including contacts, photos, text messages, and more. They also serve as portals to cloud services, so you can imagine how stressful it would be to misplace one of these devices... Read more...
Another day, another thing-that-is-hacked. This time it was popular cloud storage service Dropbox, but fortunately, the hackers were security researchers. Two of them, actually, named Dhiru Kholia and Przemyslaw Wegrzyn, who found a way to... Read more...
Android may have been birthed as an operating system for digital cameras, but after being acquired by Google, it's since grown to become the most popular mobile OS in the world. Cyber criminals have taken notice, and according to a study... Read more...
Privacy and security have been steaming-hot topics these past few months, and as evidenced in comment sections around the Web, they're topics not everyone can agree on. This latest story, of a school district in Glendale, California, is... Read more...
Orbit Downloader is a nifty tool. It’s a web browser file downloading add-on, and it lets users more easily manage their downloaded files, download embedded videos, speed up downloads, and more. Unfortunately, it’s also apparently now an effective tool for delivering Distributed... Read more...
The game's acronym may inspire laughter, but a recent hacking targeting it is as serious as a heart-attack (alright, maybe not that serious). Riot Games, LoL's developer, posted on its website this week that 120,000 transaction records... Read more...
Well, that’s one way to prove a point. One Khalil Shreateh (pictured), after discovering a bug in Facebook that allows users to post on someone else’s Timeline even if they’re not friends, failed to get Facebook’s attention regarding the matter. So he used the exploit... Read more...
It’s not news that Android has some security problems, but here’s another one: Android wallets aren’t secure. According to Bitcoin, the issue stems from a secure random number generator in the OS itself, which is vulnerable to exploits. The generator is needed to secure the... Read more...
Mainstream All-In-One PCs have become increasingly more popular in recent years, but AIO workstations remain a rare breed. After all, workstations typically require more horsepower than your average AIO, and IT folks demand better access to a computer’s internals than most ordinary AIOs allow. That makes HP’s Z1 workstation... Read more...
One of the worst things about Web security - and perhaps security in general - is that many people don't pay any attention to it. When Chrome, or another Web browser, asks you to store a password, do you happen to think about how it's... Read more...
First ... Prev 104 105 106 107 108 Next