Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Intel went on a bit of a storage blitz today at its Memory and Storage 2020 event, unveiling a bunch of new generation enterprise and client SSDs that are mostly centered around its advancements in Optane memory. They include several... Read more...
It seems Qualcomm is having a devil of a time fixing a security flaw related to its Adreno GPU driver code. It was brought to Qualcomm's attention by Google's Project Zero team, which sniffs out vulnerabilities and compels companies to... Read more...
Over the weekend, it was announced that a nation-state actor had breached SolarWinds’ Orion service as early as Spring of this year. The Orion platform is an all-in-one solution for IT administration and monitoring, among other utilities... Read more...
Simply put, malware and adware sucks, especially when it tries to be sneaky. Thankfully, Microsoft is on the prowl for malicious software trying to worm its way onto people’s systems. Since at least May of this year, Microsoft discovered a... Read more...
FireEye, a prominent cybersecurity firm, says it is working with the US Federal Bureau of Investigation and several key partners, including Microsoft (which recently warned of a rise in cyberattacks), into a highly sophisticated and... Read more...
In the early days of the COVID-19 pandemic, IBM created a global security task force, called X-Force, dedicated to threat intelligence and analysis for organizations that are part of the vaccine supply chain. The work the task force has... Read more...
We’ve seen ransomware in hospitals and schools, and it wreaks havoc no matter the case. This is especially true when people are relying on technology now more than ever due to the COVID-19 pandemic. The Baltimore County Public School... Read more...
Smart home appliances and internet of things (IoT) devices are becoming part of daily life for many. You may even have one of these devices near you right now and it's likely connected to the internet in some way. While the product... Read more...
Official support for Windows 7 might have ended in January of this year, but software support for Microsoft's older operating system hasn't completely dried up yet. Google still fields the world's most popular web browser, Chrome, on the... Read more...
Attackers with physical access to a device can generally do the most damage to a machine. This remains true with CVE-2020-8705, where an attacker with physical access can gain control of the system firmware while the device resumes from a... Read more...
For many, Ubuntu is the go-to distribution for a Linux desktop. Sure, there are a host of other distributions, some of which like Linux Mint are themselves based on Ubuntu. Thanks to pre-built systems like Dell's XPS 13 Developer Edition... Read more...
We are all adapting to life amid a pandemic, with many people working from home as COVID-19 continues to spread. But it is not just newfound telecommuters who are adapting. So are malware authors, who are changing their lures in attempts... Read more...
A security firm warns that an "unskilled attacker" could leverage a security flaw in SonicWall VPN (virtual private network) appliances to run arbitrary code remotely, causing a persistent denial of service (DoS) condition. Or put more... Read more...
There is a hacking campaign to disrupt this year's presidential election in the United States, according to a warning issued by the Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA). Hackers... Read more...
Approximately two weeks ago, the U.S. military’s Cyber Command, under the National Security Agency (NSA), executed a coordinated attack on the Trickbot botnet. This attack included sending disconnect commands to computers infected with the... Read more...
Cupertino, we may have a problem. A researcher claims Apple's T2 security chip is vulnerable to an exploit that, if leveraged, would give an attacker full root access and kernel execution privileges. Normally this sort of thing would... Read more...
Samsung's line of Galaxy handsets hardly need an introduction. By now, even casual smartphone shoppers are familiar with the Galaxy brand, which spans top-of-the-line flagships like the Galaxy Note 20 and Galaxy S20, to much more affordable options like the Galaxy A and Galaxy 5G. And of... Read more...
Oh great, as if 2020 has not been challenging enough already, the latest Digital Defense Report from Microsoft outlines some troubling cybersecurity trends. Threat actors are "rapidly" increasing the sophistication of their cyberattacks... Read more...
VMWare and NVIDIA announced at VMWorld 2020 that the two companies are teaming up in the datacenter market and in the cloud. The duo is combining their strengths to provide AI software integrations with GPU-accelerated solutions suited for... Read more...
Amazon is currently training a bunch of psychics, who will then license their talents to businesses across the US to read people's palms to determine their future, specifically to see if they pose a security threat. Just kidding! There... Read more...
While COVID-19 can claim some credit for more workers than ever performing their job duties remotely over the course of this year, the fact is the corporate world has been moving in that direction for a long time. At the same time... Read more...
Malware known as Joker is no laughing matter, especially if you have downloaded an infected app that could bring its payload. The Zscaler ThreatLabZ research team recently discovered seventeen Android apps with Joker malware. These... Read more...
First ... Prev 36 37 38 39 40 Next