Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

There are millions of Android apps in Google Play, and while there are safeguards in place to keep malicious ones from sneaking in, a few bad apples inevitably creep through the door. When that happens, millions of devices can end up... Read more...
If you own a modern desktop PC or laptop, or even one that's a bit older, you're probably affected by a newly discovered family of side-channel attack vectors that have been dubbed Hertzbleed. In separate security advisories, Intel... Read more...
MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) researchers say they have discovered an unpatchable vulnerability affecting Apple's custom Arm-based M1 silicon at the chip's last level of defense. Since it is not... Read more...
If you thought AMD would only talk about dollars and cents at its Financial Analyst Day event, think again. Sure, AMD CEO Dr. Lisa Su shared plenty of data on TAM growth opportunities and ongoing investments, but it’s all predicated on a... Read more...
Yesterday, we reported on a data breach at Shields Health Care Group that resulted in the theft of personal information belong to 2 million Americans. Oftentimes, data stolen in breaches like this end up on online forums or marketplaces... Read more...
Personal information is also valuable information, as personal data in the wrong hands can empower cybercriminals to commit identity theft and fraud. However, even those who take important steps to secure their personal information can... Read more...
We're halfway into 2022 and security researchers have started to publish data on emerging trends in cyber-security. The emerging trend that seems to be catching researchers attention today happens to be related to the largest, widest, and... Read more...
Malware and virus threats are practically commonplace, even a daily occurrence for some users these days. Unfortunately for many users in the Microsoft ecosystem, leveraging popular Office applications is a common security attack vector... Read more...
Another week, another malware attack vector has become increasingly popular amongst malicious software distributors. The vector has existed since late 2021, but it is potentially bad for Linux enthusiasts who use Windows. Said attack... Read more...
The only real certainties in life are death, taxes, and scammers trying to swindle you out of your money. In the digital age, that means phishing scams run rampant, as it's a relatively low effort and potentially high reward ruse. Some... Read more...
Windows updates are typically supposed to patch security holes, add new features, improve performance, increase stability, or offer some combination of all those things. They're not supposed to leave your PC in worse shape then before they... Read more...
Barring any regulatory hurdles, Broadcom is buying virtualization giant VMware for around $61 billion in a cash and stock transaction, the two companies announced today. The sale amount is based on the closing price of Broadcom's common... Read more...
Google has begun rolling out another update to its Chrome browser on all the major desktop platforms (Windows, Linux, and Mac) and there are at least 32 reasons why you should apply it sooner rather than later. That's the number of... Read more...
Cybersecurity experts are constantly trying to improve user account security. This task can be a difficult one when users don’t take basic steps to secure their own accounts. A recent report found that the most commonly used passwords... Read more...
Earlier this month, Clearview AI reached a settlement agreement with the American Civil Liberties Union (ACLU) over the company’s usage of Illinois citizens' biometric data without their consent. Clearview AI sells its recently patented... Read more...
Facebook does not have the best track record when it comes to its privacy. However, there are a few things you can do as a user which can help protect your account and personal information from other users. Social media apps have become... Read more...
It seems that every day a new malware threat rears its ugly head. Every once in a while though, the new threat is a version of an old threat. For example, PDFs as a method of malware delivery. That's what researchers at HP Wolf Security... Read more...
The past week, Vancouver was the site of the 2022 Pwn2Own contest, a timed test of skills for hackers and cybersecurity experts. This year marks the 15th anniversary of the contest, and 2022's gathering didn't disappoint. 17 contestants... Read more...
In what seems to be the year of security breaches and threat actors thieving or or holding data for ransom, defenders, or blue teamers, cannot seem to catch a break. However, just after announcing that it had hit a major component supplier... Read more...
Security researchers from the Technical University of Darmstadt in Germany have found that even if an iPhone has been powered off, some segment of its wireless connectivity remain active in the device. Most notable is Bluetooth, though NFC... Read more...
No one in computer security can catch a break lately, it seems, as yet another two major cybersecurity flaws have been found related to web servers. Named Sysrv-K by security researchers on Microsoft's Security Intelligence Twitter, te... Read more...
May 2022 has not been a good month for operating system updates. Microsoft had a problem with Active Directory and later driver crash blue screens of death (BSoD). Now it appears Apple has zero-day security exploit problems affecting many... Read more...
First ... Prev 18 19 20 21 22 Next