Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

If we’ve learned anything from reporting on phishing attacks, it’s that no company, organization, or institution is immune from becoming the victim of one. Even the US Department of Defense recently fell victim to a $23.5 million phishing... Read more...
We put a lot of faith in the prospect that our information is secure. Unfortunately, this is often just not the case. It is not hard for hackers and security ne'er-do-wells to get access to peoples' accounts when they use weak passwords... Read more...
AMD has been tearing it up in the desktop market with its Ryzen 5000 series processors since their release, but news on the Threadripper front has been comparatively quiet. Threadripper and Threadripper Pro 3000 series processors launched all the way back in 2020, and up until a few months ago... Read more...
Amazon published a press release this morning announcing that it has entered into a merger agreement with iRobot, the company best known for its Roomba line of robot vacuum cleaners. So long as the deal receives shareholder and regulatory... Read more...
The US Government’s Cybersecurity and Infrastructure Security Agency (CISA) maintains a list of exploited vulnerabilities and releases notices urging organizations, particularly government agencies and contractors, to patch said... Read more...
It is always a good idea to secure your online accounts with a strong password and two-factor authentication, but even that might not stop a new piece of malware discovered by security firm Volexity. According to the company's threat... Read more...
Malware campaigns employ different techniques to smuggle malicious software onto computing devices without the notice of users or anti-virus systems. Threat actors who develop and distribute malware frequently rely on various forms of... Read more...
Samsung talked about its next gen storage technologies during a keynote at the Flash Memory Summit 2022. During the Santa Clara Convention Center event, the South Korean electronics giant touched on what it bills as transformative... Read more...
In May of last year, Colonial Pipeline was struck by a ransomware attack, prompting the Colonial Pipeline Company to take certain systems offline in an attempt to contain the attack. As a result, all pipeline operations were temporarily... Read more...
Google is engaged in a never ending game of cat and mouse with threat actors on its Play Store who employ different techniques to sneak malware-ridden apps onto the app store. We fairly regularly write about newly discovered batches of... Read more...
Macros can be highly useful tools in Microsoft Office. Most Microsoft Office macros use Visual Basic for Applications (VBA) or Excel 4.0 macros (XLM). These programming and macro languages have a surprising amount of access to system... Read more...
Ransomware can be both disruptive and costly for its victims. A recent report found that the total downtime resulting from ransomware attacks in 2021 cost schools a whopping $3.56 billion. The sudden encryption of data on computer systems... Read more...
It seems these days that security researchers are sounding the alarm on malicious Androids apps in Google Play at an alarming rate. So it goes again with a fresh reporting highlighting over two dozen Android apps packaged with malware, and... Read more...
Malware spammers have been sending out emails that leverage a legitimate copy of the Windows Calculator app to sideload malware. This is yet another cunning ploy by cyber threat actors, however the victim would have to willingly go through... Read more...
Ransomware attacks have been on the rise. This time around, the small Ontario, Canada town of St. Marys has been targeted. The ransomware organization behind the attack seems to be LockBit. So far though, no ransom has been paid. The town... Read more...
It's that time again, time for the listing of apps that you might have downloaded that contain malware or methods in which to plant malware on your phone. Specifically for those who utilize Android and the Google Play Store these apps flew... Read more...
While malware and phishing are two different kinds of cyberattacks, threat actors sometimes use both methods in malicious campaigns. A threat actor known as Roaming Mantis appears to be doing exactly that in a new campaign documented by... Read more...
Near the end of 2020, Apple introduced a dedicated app privacy section to the App Store, requiring developers to disclose what user information is linked to users’ identities and used to track them. Then, in May of 2021, Google announced... Read more...
WordPress is one of the most popular and thus commonly used content management systems (CMS) on the web. However, it has a particular problem with add-on, extension, and plug-in authors abandoning their projects, and subsequently leaving... Read more...
We cover both ransomware and Elden Ring fairly regularly here at HotHardware, but it’s a sad day when those two things meet. The ransomware attacks that often receive the most coverage are those that disrupt major supply lines and... Read more...
Earlier this year, SK Hynix acquired Intel’s NAND flash business and formed a new entity, dubbed Solidigm. For all intents and purposes – to this point, at least – Solidigm's operation is a well-oiled machine and subsidiary that has taken Intel’s established and... Read more...
Phishing attacks employ various methods to trick users into handing over sensitive information, such as login credentials. Over time, as users have become more suspicious and email clients, web browsers, and IT departments have implemented... Read more...
First ... Prev 16 17 18 19 20 Next