Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews
In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.
Apple has released an update for your iPhone that you are going to want to download as soon as possible. Update iOS 15.3 includes a patch to fix a security vulnerability in Safari that could leak your browser history, as well as a second fix for a memory corruption bug that affects iOS, iPadOS, and macOS...
Read more...
If you haven't been keeping up with Windows news, Windows 11 is really trying to be tough on security. As part of that push, one of its major requirements is that your system must have a Trusted Platform Module, or TPM. Historically speaking, that was a physical device on your motherboard that provided an immutable...
Read more...
Even with malware attacks against Linux on the rise, a major security vulnerability has somehow been lurking in every Linux distribution for a dozen years. Just hours after the bug became public, a proof-of-concept (PoC) exploit showed up in the wild. The problem lies within a system utility called Polkit, which...
Read more...
If you're not a Linux sysadmin, you might not be familiar with Control Web Panel, but if you are a Linux sysadmin, you almost certainly are at least aware of the app. Control Web Panel, or CWP, is a free Linux control panel for various web services. It used to be called CentOS Web Panel, but these days it's supported...
Read more...
Samsung has built a fingerprint security chip that is aimed at making payment cards and other types of biometric cards more secure. The new security solution combines a fingerprint sensor with other technology in order to strengthen your payment cards against thieves.
In a day and age where carrying cash is...
Read more...
It felt like we were constantly reading about data compromises last year. Unfortunately, this statement is not far from the truth. According to the Identity Theft Resource Center (ITRC), there were 1,862 data compromises in 2021. The overall number of data compromises was up by 63% from 2020 and the number of...
Read more...
Scanning a QR (Quick Response) code sure is an easy and convenient way to access information, like a restaurant's menu, but be careful of scanning codes willy-nilly. The US Federal Bureau of Investigation (FBI) felt compelled to issue a warning about cyber-criminals tampering with QR codes to ultimately steal your...
Read more...
WhatsApp users may soon be able to migrate their chat history from an Android phone to an iPhone. Incidentally, the chat migration feature is already available for users moving their chat histories from iPhone to Samsung Galaxy and Google Pixel phones.
When it comes to messaging apps, WhatsApp is one of the most...
Read more...
This week, a security vulnerability in Dark Souls 3 was discovered, allowing remote code execution (RCE) and any threat actor to wreak havoc on your PC. As this vulnerability only affects players who play online, potentially across the Dark Souls series, servers have been switched offline, and it seems Dark Souls...
Read more...
When people think of malware and malicious code, they might imagine an infected file or download from a sketchy email or website on their computer. However, this sort of infection is realistically only the tip of the iceberg and often some of the least sophisticated. Researchers at Kaspersky have found a complex...
Read more...
Windows Updates are great when they work properly, but many users like to have more control over when and how they update their OS. Microsoft's TechCommunity Blog, however, says there are a bunch of things that you probably should not attempt to control yourself.
Power users and system administrators commonly use...
Read more...
Imagine it's the year 20XX. Hopefully you're healthy. You're also sitting on your front porch watching Amazon's package drones whiz through the skies while awaiting your own delivery. It slowly starts to prepare for landing before suddenly veering off somewhere else! What happened!? Well, Michigan State University...
Read more...
To the casual observer, the world of cryptocurrency may seem like the modern version of the Wild West. It definitely doesn't help the optics when hackers infiltrate one of the leading cryptocurrency exchanges, Crypto.com, and swipe $15 million worth of Ethereum, as a blockchain security and data analytics company...
Read more...
AMD is fleshing out its current-generation Radeon Pro lineup with RDNA 2 underneath the hood with the introduction of the Radeon Pro W6400. It slides into the lineup beneath the existing Radeon Pro W6600 for medium to high-level workloads, and the Radeon Pro W6800 designed for high to extreme workstation workloads. So...
Read more...
If you’re a Safari user, either on desktop or iOS, it may be time to change browsers, at least temporarily. More flaws have been uncovered in Safari’s tracking prevention system. In this case, a bug within Safari 15 means that any website is able to track all of your internet activity and even reveal your...
Read more...
Microsoft has been toppled from its position on at least one list, but it’s doubtful the company is too upset over it. International shipping service DHL took the No. 1 spot as most-imitated (spoofed) brand in phishing attacks for the fourth quarter of 2021.
In many phishing attacks, the attacker tries to fool the...
Read more...
Linux used to be considered fairly safe from malware. Few, if any, threat actors targeted the Unix-based operating system. That’s changing rapidly, though, as reports indicate malware for Linux increased by 35 percent in 2021, compared to the previous year.
Linux is commonly used for Internet of Things (IoT) devices. With more people adopting
Read more...
Quick! You're a multinational shipping conglomerate, what is something that stays in the forefront of your mind on the regular? Apparently, if you are FedEx then missile defense systems are exactly what's on your mind.
In what seems like a scene from an Austin Powers movie a recent proposal to the US Federal...
Read more...
This really should go without saying, but for the benefit of anyone who needs reminding, be extra cautious about where you buy items online. That also means double and even triple checking the URL. The reason for the reminder is because Nintendo posted a warning saying it knows of at least one fake site actively...
Read more...
End-to-end Encryption for most people this is something invisible they never even think about, but for just about everyone who uses messaging apps such as Facebook Messenger, WhatsApp, Signal and many others, this is an absolute necessity for privacy.
In a recent report by Rolling Stone it was revealed that the UK...
Read more...
Some people may find this hard to believe, but the built-in antivirus protection in Windows is pretty good these days, and has been for quite some time. Defender routine passes musters by independent AV testing agencies. Unlike other AV solutions, though, it is exclusive to the Windows platform for consumers. Perhaps...
Read more...
It seems as though antivirus software companies don't only want to secure your computers nowadays, but your crypto mining efforts on those PCs as well. Customers of two antivirus software products have the ability to opt-in to crypto mining on their protected PCs.
The world of cryptocurrency and NFTs has been...
Read more...