Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

The key to any malware campaign is getting malicious code onto a target device, and often, attackers will use a legitimate app store as a vector. Samsung's Android smartphones ship with the Google Play Store, which has hosted its fair... Read more...
Yesterday, T-Mobile, one of the big three mobile internet service providers in the US, announced that it recently fell victim to a data breach. The company disclosed this information in both a news release and a filing with the Securities... Read more...
This past July, we wrote about a report published by Coverware that found that the dollar value of the median ransomware payment was on a downward trajectory beginning in Q1 2022 and continuing in Q2 of the same year. However, we weren’t... Read more...
Among the requirements for installing Windows 11 are two security features: Trusted Platform Module (TPM) version 2.0 and Secure Boot. As we’ve documented before, it’s possible to sidestep these requirements and force a Windows 11 install... Read more...
Hardware vulnerabilities are never fun, especially when actively exploited in the wild. Forward-looking companies try to get ahead of bad actors by encouraging responsible disclosure and awarding bug bounties. AMD has worked with security... Read more...
The Liquor Control Board of Ontario (LCBO), a government organization that sells alcoholic beverages within Ontario, Canada, has published a statement notifying customers of a cybersecurity incident affecting the retailer’s online store... Read more...
Intel 4th Generation Xeon Processors (Sapphire Rapids) Intel’s tiled chiplet approach with specialized accelerators could open the door for some truly custom server recipes for individual customer demands.   Accelerated... Read more...
A new report claims that a law enforcement app leaked the personal details of suspects and police officers involved in major police operations going all the way back to 2011. SweepWizard, the app in question, was developed by ODIN... Read more...
OneDrive is Microsoft's answer to the Dropboxes and Google Drives of the world, and it's about to get cheaper. Microsoft has announced a new "Basic" tier of the service, which will cost $1.99 per month or $19.99 per year. It replaces a... Read more...
It's no secret that cyberattacks have been on the rise lately, but a series of failures today may raise some eyebrows. The United States, Canada, and the United Kingdom have all experienced critical service disruptions today, and the root... Read more...
Those who follow cybersecurity news will know that both security researchers and threat actors alike are frequently discovering security vulnerabilities, prompting developers to create and release patches for these vulnerabilities. While... Read more...
Intel is launching its 4th Gen Xeon Scalable Processors (codename Sapphire Rapids) today, along with the Xeon CPU Max Series (codename Sapphire Rapids HBM) for datacenter customers. The company has been slowly disclosing information since... Read more...
In a collective "I told you so" moment, security experts were proven right as California's newly-minted digital license plates have been hacked by a group of security/vulnerability researchers. The team was able to track the plate by GPS... Read more...
Cybersecurity researchers at ASEC have uncovered a threat campaign distributing remote access software under the guise of a Pokémon NFT card game. While many threat campaigns distribute Remote Access Trojans (RATs) that operate in the... Read more...
If you have a Chick-fil-A account and notice suspicious activity or unapproved purchases, take action now, because with the fast food chain has been hacked, affecting an unknown number of user accounts. As early as the beginning of... Read more...
AMD's RDNA 3 GPU architecture found in the Radeon RX 7900 family of graphics cards was a tremendous leap in performance over the previous generation found in the Radeon RX 6000 series. Therefore, it only stands to reason that the next... Read more...
We all like to think our organization's e-mail is secure—secure in the knowledge that your IT administrator is keeping things up to date, safe, and secure. After all, you have to change your password every three months, right? Well... Read more...
We're rapidly entering a new era of blistering-fast storage and platforms supporting PCI Express 5.0 and CXL 2.0 take hold. Both AMD (Zen 4/AM5) and Intel (Raptor Lake/Z790) lay in wait. To make sure they don't wait too long, Phison is... Read more...
It's not often that malicious actors in the malware and virus space apologize, but that is exactly what happened on New Year's Eve after a ransomware attack targeted a children's hospital system in Canada. The LockBit ransomware gang... Read more...
Earlier this year, Google awarded a security researcher $107,500 for finding vulnerabilities in the company’s smart speakers. The researcher demonstrated that these vulnerabilities could be leveraged to link secondary accounts to Google... Read more...
This week, Lake Charles Memorial Health System (LCMHS) in Louisiana published a notice informing its patients of a cybersecurity incident that occurred back in October of this year. According to the notice, threat actors gained... Read more...
BIT Mining Limited has published a news release disclosing that the cryptocurrency mining pool run by its subsidiary, BTC.com, suffered a cyberattack earlier this month on December 3. In the course of the attack, threat actors stole... Read more...
First ... Prev 9 10 11 12 13 Next