Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Nowadays, it is a matter of when, not if, a cybercriminal will breach a company or organization. It appears that the U.S. Federal Bureau of Investigation (FBI) is figuring this out the hard way, as a threat actor has been sending emails from the FBI's system infrastructure since early this morning. While this should... Read more...
If there was a poster child for business-class laptops, it is indisputably the Lenovo ThinkPad. ThinkPad notebooks are well known for their matte-black, no-nonsense designs, but their utility in corporate and industrial settings is more than skin-deep. Lenovo has wisely developed an array of ThinkPad models to address... Read more...
Kioxia has begun shipping a new line of solid state drives for the enterprise market (separate from its recently introduced CD7 line), the EM6 series, though these are unique from past offerings in the segment. These are NVMe-oF (Non-Volatile Memory Express over Fabrics) drives for Ethernet Bunch of Flash (EBOF)... Read more...
Apple is launching a subscription services for small and mid-sized business with up to 500 employees. Appropriately called Apple Business Essentials, the general idea is to make IT chores easier and more streamlined as business grow, by bundling device management tasks into a single subscription that covers the... Read more...
AMD had quite a bit to say about its updated 3rd Gen EPYC processors with 3D V-cache and new Instinct MI200 GPU accelerators, which deliver massive firepower to enable exascale computing in the HPC sector. But those weren't the only nuggets Dr. Lisa Su and the gang dropped during yesterday's event. Towards the end of... Read more...
This weekend, cyber-security firm Palo Alto Networks released a detailed analysis of an ongoing hacking campaign targeting technology, defense, healthcare, energy, and education industries. The attack targets Zoho's ManageEngine ADSelfService Plus password management system and uses vulnerability CVE-2021-40539 to... Read more...
For chip companies, bigger profit margins can be found in the data center market, and that's often where we see new innovations manifest first before trickling into the consumer space. To wit, we know AMD is prepping a Zen 3 refresh with stacked 3D V-cache. While we patiently wait, AMD today also just introduced 3rd... Read more...
Google has attempted to answer why the fingerprint sensor on its Pixel 6 phones is, at times, noticeably sluggish. For some, however, the reason Google gives just does not match up, leaving them to wonder if there is more at play. The Pixel 6 and 6 Pro are the first in the family of Pixel phones to have an... Read more...
When you open an app or website, location or GPS permissions are one of those things people tend not to allow. However, what if the app or site was able to extrapolate where you are without even needing new permissions? This is potentially happening on your Android device as security researchers have shown that motion... Read more...
Nearly eight and a half years ago, Intel launched its 4th Generation Intel Core Processors, codenamed Haswell. In that time, researchers have discovered a number of security vulnerabilities that can typically be addressed via software and firmware updates. Unfortunately, Intel must ad one more to the list that... Read more...
It's easy to think of hackers in the colloquial sense as being the enemies of society. People who break into computer systems and sabotage electronics to gain control of them or steal data; how could someone like that be of benefit to society at large? The answer is that a great many so-called "hackers" are in fact... Read more...
Do you ever forget to type the TLD (like, ".com") for websites that you visit, then click the top result when the inevitable search comes up? We might recommend you to stop doing that in the future. At least on Google and Bing, the first few results are advertisements, and those advertisements might not be as safe as... Read more...
Remember the old days of code pages and customized OSes for specific languages, like DOS/V? Unicode has more or less solved the biggest issue with displaying non-ASCII glyphs on computers, although it's still up to the operating system to implement support, of course. Did you know you can write source in Unicode... Read more...
If you thought being in the swanky C-suite of a major company kept you safe from hackers, think again. Those positions, among other high-ranking posts, are the latest targets in the ongoing infosec war between businesses and hackers. Many of us worry about getting our Amazon Prime account or our bank account hacked... Read more...
Cheaters never prosper, especially when they are being targeted by ransomware-laden files scattered about the internet. Whether or not comeuppance like this is deserved, Japanese Minecraft players looking for alternate accounts to cheat or circumvent bans are being infected by the Chaos ransomware variant in a ghastly... Read more...
If you were a threat actor, what better way to get a payload onto someone’s device than through a program that nearly everyone has installed like Google Chrome? Unfortunately, this appears to be what is happening with the Infostealer malware, masquerading as a legitimate update to the popular web browser from Google... Read more...
One of the main reasons that the malware epidemic in the Windows XP days was so severe was because almost all those machines were configured with only a single user account that had administrative privileges by default. That meant that any malware running as that user would have free rein to do whatever it wanted on... Read more...
Do you use BQE Software's BillQuick? If you do, go update it—immediately. Huntress ThreatOps identified nine zero-day vulnerabilities in BillQuick Web Suite, a time and billing software that the publisher claims is in use by over 400,000 users worldwide. The most serious vulnerability is an all-too-common SQL... Read more...
Malware on Windows devices has become a real problem in the last few years, specifically with a recent uptick in ransomware. It appears that Microsoft has been trying to combat this issue, though, with updates to Microsoft Defender, so it has more teeth than ever before. However, what if Microsoft is part of the... Read more...
Everyone who uses an Android phone has probably had some security-conscious acquaintance ask, "don't you know how much data your phone is harvesting?" Most of us shrug it off as one of the unavoidable circumstances of modern life: you want a smartphone, you deal with data harvesting. Still, some folks aren't so... Read more...
Attempting to upgrade a PC to Windows 11 when the system doesn't meet the minimum system requirements for any reasons elicits an ominous warning message foreboding potential doom and destruction. That's only a slight exaggeration. Part of the warning message states unsupported PCs are not entitled to receive updates... Read more...
For at least the second time in 2021, hackers have breached Acer's servers, this time plundering more than 60 gigabytes of data. Acer has confirmed that names, addresses, and phone numbers belonging to several million clients have been compromised in the breach, as well as sensitive corporate financial and audit... Read more...
First ... Prev 25 26 27 28 29 Next