Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

A new study has found something very disturbing on some of the top websites in the world. Researchers from the Princeton Center for Information Technology Policy have conducted research that found that over 400 of the top 50,000 websites... Read more...
Here we go again. In 2016, authorities tried to legally compel Apple to unlock an iPhone model that belonged to one of the terrorists in the San Bernardino shooting that left more than a dozen people dead. Apple resisted, and the Federal... Read more...
OnePlus is catching heat from its customers yet again, this time for the discovery of a pre-installed application found on several of its handsets that could allow an attacker to gain root access. The application is a diagnostics tool... Read more...
As part of a recent case study, Google teamed up with the University of California, Berkeley, to better understand how hijackers attempt to take over email and social networking accounts. As any thirty-something who grew up watching G.I... Read more...
Most people have probably never been to Cloudflare's San Francisco office, but those who have been there would have noticed a large wall of lava lamps in the lobby. It is hard to miss—after all, it is not everyday that you come across... Read more...
Yesterday, Qualcomm announced that its Centriq 2400 Series processors are now shipping to its customers, nearly a year after it began sampling the chips. Available in 40-, 46- and 48-core versions, the Qualcomm is positioning Centriq 2400... Read more...
The Federal Bureau of Investigation (FBI) has been unable to access data on a locked smartphone that belonged to Devin Patrick Kelly, the individual who opened fire in a church in Sutherland Springs, Texas, leaving 26 people dead and... Read more...
Today, Qualcomm officially announced that it has begun shipping its Centriq 2400 server processors to its OEM partners. This marks a big step for Qualcomm, which is no stranger to the mobile market with its Snapdragon processors, but is a... Read more...
Microsoft has published a new and official set of standards for consumers who want to ensure they have a "highly secure Windows 10" device. The new standards are for general purpose desktops, laptops, tablets, 2-in-1s, mobile workstations... Read more...
As part of AMD's comeback tour into the high-end market sector, it released new CPU and GPU architectures, Zen and Vega respectively. And with Zen, AMD has been focused on attacking every market sector, including mainstream desktops (Ryzen... Read more...
Google is working hard to make the web a more secure place and with its Chrome browser being the most popular browser on the market by most accounts, that was a good place to start. Google says that security has always been one of the core... Read more...
A security firm is warning of a new botnet targeting IoT (Internet of Things) devices that is on the move. Dubbed IoT_reaper, the new botnet borrows some of the source code from Mirai, which took down the popular security blog... Read more...
Google knows that exploits make it through the app development process and could be lurking in some of the most popular apps on the Google Play Store, waiting for a nefarious hacker to take advantage. To help weed out these... Read more...
Google has announced a new program for those who are most vulnerable to targeted attacks on via its services. Google says that the Advanced Protection Program is aimed directly at journalists, business leaders, and political campaign... Read more...
Hacking happens all the time, and when it affects a large number of people, companies typically disclose the breach. Not always, of course, sometimes not even in a timely manner. As it pertains to Microsoft, something a little different... Read more...
This morning we talked about a researcher from KU Leuven University in Belgium who had discovered a major security vulnerability in the WiFi Protected Access II (WPA2) protocol that is used to secure wireless internet traffic. That... Read more...
Cybercriminals have developed a new form of Android ransomware that gives victims added incentive to pay up. In addition to scrambling the user's data with an AES encryption algorithm, the new ransomware replaces an infected device's... Read more...
A security expert at Belgian university KU Leuven has discovered a major vulnerability in the Wi-Fi Protected Access II (WPA2) protocol that could a expose a user's wireless Internet traffic, including usernames and passwords that are... Read more...
All statistics are notable in their own right, but once in a while, one comes along that seems downright mind-boggling. Take this one: 500 million people are currently affected by unauthorized cryptocurrency mining. Remember when pop-up... Read more...
After an almost mind-boggling number of security and privacy issues that have deluged into our lives over the past handful of years, you'd think that companies would begin to take their customers' private data seriously. Still, there are... Read more...
Late last year a hack was perpetrated on what is called a "partner organization" that worked with the Australian Signals Directorate (ASD). The unnamed organization notified the ASD that it was hacked in November of 2016, and that outside... Read more...
A software engineer has discovered that OnePlus is actively collecting certain data on its users without their knowledge or permission. Chris Moore, owner of a UK-based security and tech blog and a finalist at Cyber Security Challenge UK... Read more...
First ... Prev 62 63 64 65 66 Next