Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Security outfit Avast Software has partnered with Facebook to share its Virus Lab data with the social networking service. In doing so, Facebook now has access to Avast's real-time cloud database, which it will use to block malware from... Read more...
When considering a new storage solution, most users try to find the right balance between speed and capacity. SSDs are super fast, no doubt about it, but an HDD spinning at 7200RPM or 10,000RPM will still offer solid performance, and you have access to dramatically more storage capacity for a far lower cost per GB compared to... Read more...
One of the downsides to Mozilla's rapid release schedule for Firefox is that new updates are at risk of being rushed to the public before they're ready for prime time. We're not sure if that's what happened here, but we do know that... Read more...
A self-proclaimed security enthusiast has exposed a major flaw in Facebook, one in which nearly every user's phone number can be used to view their personal information. His name is Suriya Prakash, and his method of cultivating numbers involves using Facebook's mobile site to bypass security... Read more...
It’s not clear how many jobs will be lost, but according to a Reuters report, at least a small percentage of Intel’s McAfee security division will be getting the pink slip soon. McAfee has about 7,100 employees, so even a... Read more...
According to new research sponsored by HP, the cost and frequency of cybercrime has increased for the third straight year. The third-annual Cost of Cyber Crime Study shows the occurrence of cyberattacks has more than doubled since 2010... Read more...
Tensions with China's government are already at an uncomfortable level, but who would have guessed that they would trickle into mobile? Yet that's exactly what's happening, following an investigation by a congressional panel into Chinese... Read more...
The web is a dangerous place, and one of the threats that emerged in 2011 was that of malnets, or malware networks, which are just what they sound like. These infrastructures are designed to last beyond a single attack and allow cybercriminals to adapt to new vulnerabilities and launch malware... Read more...
Think your week was rough? Trying running security for a U.S. bank, many of which were hammered with non-stop cyberattacks for more than seven days. According to reports, Bank of America, JPMorgan Chase, Citigroup, and around half a dozen... Read more...
Tread carefully on the Internet, surf ninja. That's always sound advice, but it's especially important now to be extra cautious, particularly if you use Java. Researchers at Security Explorations discovered a zero-day exploit in multiple versions of Java that could affect over a billion PCs... Read more...
While everyone is bringing their own mobile devices to work, those phones might as well be put to work contributing to building security; at least that’s the purview of HID Global, which announced the results of a pair of pilot... Read more...
The power of the Internet makes us wonder how we ever got along without it. Case in point: Kevin Burke, an independent developer, discovered a major security hole that left six million Virgin Mobile USA customers vulnerable to a relatively simple brute force attack. After alerting Virgin... Read more...
Still clinging to Internet Explorer? If so, be aware of a recently posted security advisory (2757760) alerting IE users of a vulnerability that could allow attackers to execute malicious code from a remote location. According to Microsoft... Read more...
Intel's next-generation CPU, codenamed Haswell, was the major star of IDF. One aspect of the chip we haven't talked about at length, however, is its emphasis on reduced power consumption. When Intel announced that its Ivy Bridge mobile products would target 17W for mainstream systems, it made... Read more...
Well here's a bit of a bummer going into the weekend. Apparently the developer responsible for the popular Black Hole exploit kit -- the one that lazy hackers and inexperienced script kiddies are particularly drawn towards -- has released a new version of his nefarious software, with new and... Read more...
With all of the advances made to vehicle technology in recent years, it'd be easy to assume that security has never been better. A video showing security footage released to the Web a couple of months ago proves otherwise, however, as thieves managed to approach a BMW one minute, and drive off... Read more...
Malware targeting Android users is on a precipitous rise, and what's even scarier is that over half of all Android devices have unpatched vulnerabilities. That's according to Duo Security, a startup with funding from the Defense Advanced... Read more...
During the Day Two keynote address at the Intel Developer Forum, Renee James, Senior Vice President and General Manager of Intel’s Software & Services Group, talked about software development, security and services in an... Read more...
Thanks to the investigations kick-started by World of Warcraft player Sendatsu, it's been discovered that Activision Blizzard has been embedding hidden watermarks into screenshots taken with the game client over the past couple of years... Read more...
Malware scanner VirusTotal announced today that it's been purchased by Google for an undisclosed sum. Apparently Google's been a long-time partner of the online scanning service, and now the two have tied the knot in antivirus matrimony... Read more...
According to the latest McAfee Threats Report, the threat of malware is stronger than it has been in the last four years. The McAfee Threats Report for the Second Quarter 2012 found an increase in malware compared to the first quarter of this year (which was previously rated as the busiest... Read more...
Cloud-based storage solutions are all the rage these days, but if you don't want to trust your files to a third-party data center and deal with the risk of hacker attacks and unexpected downtime, maintaining your own centralized storage platform is the way to go. This is where network... Read more...
First ... Prev 112 113 114 115 116 Next