Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

We cover both ransomware and Elden Ring fairly regularly here at HotHardware, but it’s a sad day when those two things meet. The ransomware attacks that often receive the most coverage are those that disrupt major supply lines and... Read more...
Earlier this year, SK Hynix acquired Intel’s NAND flash business and formed a new entity, dubbed Solidigm. For all intents and purposes – to this point, at least – Solidigm's operation is a well-oiled machine and subsidiary that has taken Intel’s established and... Read more...
Phishing attacks employ various methods to trick users into handing over sensitive information, such as login credentials. Over time, as users have become more suspicious and email clients, web browsers, and IT departments have implemented... Read more...
Earlier this year, we wrote about a vulnerability in Honda’s remote keyless entry (RKE) system that hackers could exploit to lock, unlock, and start certain Honda and Acura vehicles. This particular vulnerability was the result of Honda using... Read more...
It's been three or four days since Microsoft rolled back the macro blocking update on "Current Channel" for Microsoft Office 365 users. Finally, we have a confirmed reason and some more information about the future of macros in Microsoft... Read more...
Last year, a hacker who goes by the name “pompompurin” managed to breach a Federal Bureau of Investigation (FBI) web portal and send out thousands of hoax emails from an official FBI email address. Just a couple weeks prior, pompompurin gained... Read more...
Last week, we wrote about spyware that researchers gave the name “Hermit” and attributed to the Italian spyware vendor RCS Labs. Hermit falls within the same class of spyware as NSO Group’s Pegasus spyware, which infected at least nine phones... Read more...
Secret Service Director James Murray has left his post in order to take over as the Chief Security Officer for Snap Inc. The 27-year veteran will serve his last day with the storied security service on July 30, 2022. The Secret Service is... Read more...
In February security firms, researchers, infosec employees, antivirus, and malware organizations rejoiced. Why? Microsoft was finally disabling Visual Basic for Applications (VBA) macros on Microsoft Office. However, the Redmond software giant... Read more...
Last month, a ransomware gang known as ALPHV struck The Allison Inn & Spa, stealing employee and customer data. ALPHV then published this information to the open web, where it could be indexed by search engines and viewed without the use of the... Read more...
Earlier this year, multiple US law enforcement agencies completed a joint operation with authorities from the United Kingdom, Europol, Portugal, Germany, Sweden, and Romania. This coordinated police action, dubbed Operation TOURNIQUET... Read more...
Chrome is the most popular browser on the planet (in terms of market share) with billions of a users, and the unwanted side effect of that immense popularity in the tech space is it attracts bad actors. Such is the reason for the latest browser... Read more...
Managing passwords across all your platforms and logins can be a nightmare. You have an account for your bank, social media, smart devices, doctor, gaming platforms, work, and probably a lot more. Fortunately, Google has started rolling out new... Read more...
Most of us likely babysat, mowed lawns, or worked part-time jobs to earn money as teens. However, teens in 2022 have some rather interesting and unexpected ways to make some extra cash. Minors are reportedly developing, discussing, and selling... Read more...
A cybersecurity report published last month revealed the passwords most commonly used by business owners and executives, and topping this list were “123456” and “password.” The commonality of such remarkably weak passwords among not just... Read more...
Malicious software, commonly known as malware, is one of many threats to both cybersecurity and privacy. Cybercriminals can distribute malware to achieve a number of different goals, including siphoning funds from cryptocurrency wallets... Read more...
It's a new era and there's a new bully in schools. A financial bully to the school administrations, at least. That bully is ransomware, and he's an annoying jerk. Ransomware is an ever increasing threat that most recently has affected... Read more...
Shortly after hitting Parker Hannifin Corporation, a major component supplier for Boeing and Lockheed Martin, the Conti ransomware group abandoned the Conti name and split off into smaller groups that coordinate with the larger group’s... Read more...
Another day another vulnerability. This time we're dealing with network-attached storage hardware provider QNAP. Interestingly though, this particular vulnerability isn't entirely QNAP's fault. It's PHP. Yes, a vulnerability has been found... Read more...
It's not unusual for bad actors to inject PDF files with malware. We were reminded of this just two months ago when HP Wolf Security warned in an article titled "PDF malware is not yet dead" of a Snake keylogger campaign. To make matters worse... Read more...
If you're in the business world you've heard of Cisco. If you're in the consumer world, you probably still have heard of Cisco, or at least have probably used one of the company's products, especially considering it acquired about 218... Read more...
Would it truly be 2022 if we were not informed of at least one data breach each week? Sadly, no institution is safe from the hands of bad actors. Flagstar Bank recently disclosed that 1.5 million of its customers were impacted by a data... Read more...
First ... Prev 15 16 17 18 19 Next