Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Two security researchers from iSEC, Tom Ritter and Doug DePerry, have demonstrated the ability to hack into Verizon Wireless’ femtocells and spy on Verizon users with a simple wireless antenna. They say that they can intercept... Read more...
Fueled by the recent NSA leaks brought forth by Edward Snowden regarding PRISM, along with other government eavesdropping programs that have since been brought to light, Pirate Bay co-founder Peter Sunde and a small team have begun work on... Read more...
Less than a week ago, we posted about a newfound Android vulnerability that's not only a bit worrying, but affects potentially 900 million devices - dating all the way back to Android 1.6. The discovery and minor reveal was made by Bluebox, an up-and-comer security firm that had plans to... Read more...
It’s deeply disconcerting, to say the least, that the NSA has been able to extract data about U.S. citizens from Internet companies using the secret (until recently) PRISM program. Because all of those companies likely handle data a... Read more...
One of Nintendo’s main fan sites, Club Nintendo, was reportedly the subject of nearly 24,000 illicit logins over the course of the last month, which led to cybercriminals possibly making off with people’s real names and personal information such as email addresses, physical... Read more...
Patch Tuesday is right around the corner – July 9th, in fact – and this month’s patch is bringing several updates that warrant the “Critical” rating, which is Microsoft’s highest rating for update... Read more...
Android, like any operating system, is vulnerable to exploits. And every year about this time, we see a flurry of openings crop up as Black Hat approaches. Typically, these hacks are discovered by researchers who are looking to make the... Read more...
Ubisoft announced that it was hacked, and some user account information including usernames, passwords (even encrypted ones), and email addresses were compromised. “We recently found that one of our Web sites was exploited to gain... Read more...
For Windows users of all kinds, the Windows "Blue" 8.1 update has been long-awaited. Those who've been using the base OS since launch have no doubt been anticipating some of the enhancements that are coming, while many others have been waiting patiently to see if the update manages to... Read more...
If you have ever wanted to see through walls, but couldn't afford the expensive equipment to do so, then some MIT researchers deserve your attention. They've devised a system called "Wi-Vi", which is designed similarly to sonar where a... Read more...
While mobile use worldwide is growing at an accelerated rate, so too is the increase of malware. But accepting that idea is one thing; seeing it in numbers is another. According to Juniper Networks, the number of individual pieces of mobile malware increased 614% between March 2012 and March... Read more...
Scandinavian browser maker Opera Software was the recent victim of a hacker attack in which the infiltrators made off with at least one old and expired Opera code signing certificate. The attackers were then able to use the certificate to... Read more...
In a perfect online world, we'd all sing, "A surfing we will go, a surfing we will go, heigh-ho the derry-o, a surfing we will go," and off we'd go without fear of malware or malicious links or any of the other cruft that litters the web... Read more...
Privacy couldn't be much hotter of a topic at the moment, so it's appropriate to learn now about "black boxes" that could become not only the norm in our cars, but a requirement. Apparently, many newer cars already feature these boxes, called Event Data Recorders (EDRs), but few consumers who... Read more...
Oh Facebook - couldn't this have come at a better time? Mere weeks after news of NSA's PRISM project being leaked, which is said to involve tight integration with the likes of Facebook and other popular Web entities, we learn of a bug that... Read more...
As we discussed last month, Mozilla postponed the introduction of automatic third-party cookie blocking in its Firefox Web browser, citing the obvious: it was too hasty in its decision. Well, that hastiness appears to have worn off, as... Read more...
Do you use Java? If so, be aware that Oracle just released its "June 2013 Critical Update for Java SE," a collection of code that provides 40 new security fixes. All but three of them are security holes that can be exploited from a remote location without any kind of authentication. Four of... Read more...
In an effort to offer Internet users some transparency and to deflect negative attention from recent revelations that big companies have been sharing user data with the government via the National Security Agency's (NSA) PRISM program... Read more...
In the wake of the Washington Post leaks, there's been a great deal of discussion over how, exactly, companies like Google share data with the government. The original report implied that the NSA has direct datacenter access and either... Read more...
Intel is updating its line of enterprise-class solid state storage offerings today, with a new more cost-effective drive that targets datacenter and cloud-computing applications. The Intel SSD DC S3500 as it is known, is similar in a number of ways to the SSD DC S3700 we evaluated a few months... Read more...
Imagine whipping out your Android phone and getting past the lock screen by making a funny face rather than connecting a series of dots with your finger. Facial recognition is the key to making that happen, and it appears Google is on it, as evidenced by the fact that it filed a patent for... Read more...
Be careful what you click on, Facebook users. According to security outfit Trend Micro, variants of the info-stealing Zeus malware are "reemerging with a vengeance" and targeting Facebook users with increased tenacity in recent months. A surge of activity was noted in the beginning of... Read more...
First ... Prev 106 107 108 109 110 Next