Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Instagram users have something to worry about after hackers breached the database of the social network and photo sharing websites. The hackers were able to gain access to the phone numbers and email addresses of six million Instagram... Read more...
Andy Rubin, co-founder of Android and CEO of Essential, issued an apology after his smartphone company accidentally leaked out private data from dozens of customers to other customers. What happened was sort of akin to mass emailing a... Read more...
Would you trust your life to a hacker? No, of course not, and neither does the US Food and Drug Administration. The FDA issued a recall of nearly half a million pacemakers after the organization discovered a vulnerability that makes... Read more...
A team of researchers from Positive Technologies have dug into the innards of Intel Management Engine (ME) 11 and have found a way to turn the feature off. If you aren't familiar with ME, it's a separate processor that is tucked away... Read more...
We all know we should be changing our passwords on a frequent basis, at probably every quarter in general (and more or less often depending on the type of account and what information is accessible). It is easy to overlook, however, at... Read more...
It's been an unfortunately busy few weeks for Android vulnerabilities. Earlier in the month, we wrote about SonicSpy, a grandiose piece of malware that could gain an incredible amount of control over your device - including, of course... Read more...
Intel is ready to assault the workstation market with the release of new processors that are part of the Xeon W family. Intel claims that the Xeon W series processors up to 1.36x times faster than their previous generation counterparts... Read more...
There is good money to be earned from being an software exterminator. Several companies have so-called bug bounty programs in place in which they pay out rewards for rooting out certain software flaws and vulnerabilities. DJI, a major... Read more...
The Internet of Things (IoT) sounded like a great idea at first glance when it first began picking up steam. However, the problem with giving every single gadget that we come in contact with access to the internet is that no one really... Read more...
Just last weekend, we wrote about SonicSpy, a grossly robust piece of malware that infected hundreds of apps on the Play Store. Google is always quick to remove this awful junk when it is detected, but the fact that we keep talking about... Read more...
If there's one thing that's been made abundantly clear over the past couple of years, it's that if you dabble in cryptocurrency, you really need to do your homework and due diligence to make sure you don't wind up on the opposite end of an... Read more...
Antivirus maker Kaspersky Lab may have kissed and made up with Microsoft over a dispute in how Windows 10 handles third-party AV software, but even so companies are reportedly being warned not to use the security software. The warning... Read more...
Hacker group OurMine claims to have hacked the official PlayStation Twitter and Facebook pages Sunday night. The group took credit for the hack and posted several messages to the social media accounts, which have now all now been... Read more...
Yesterday, a video hit YouTube that could have been alarming to any Apple users anyone running an iPhone 7 or 7+, or even some iPhone 6 models. With a $500 device in hand, simple iPhone passcodes could be defeated quickly and easily, with... Read more...
It seems like more now than ever, the chance that you'll run into a situation where law enforcement wants to see what's on your phone isn't outside the realm of possibility. The problem in many jurisdictions is that law enforcement is... Read more...
A freelance security consultant and Handler at SANS Internet Storm Center has discovered a rather interesting exploit in Microsoft Word, one that allows an attacker to abuse the productivity program's ability to auto-update links. This is... Read more...
US Army recently banned the use of all drones built by drone maker DJI. The military warned that the drones might have unspecified "cyber vulnerabilities." The Army memo was published on August 2nd and read in part, "due to increased... Read more...
Here we go again. WikiLeaks, the international non-profit whistleblower that publishes secret information to the web, has been dumping classified documents outlining various hacking tools and malware used by the United States Central... Read more...
A team of scientists from the University of Washington have figured out how to infect a computer using malicious code inside DNA. This attack vector isn't aimed at your everyday PC sitting on your desk at home or in the office; this hack aims directly at the infrastructure around the DNA... Read more...
After putting legal pressure on Microsoft to provide antivirus vendors with additional time to test their software prior to new Windows 10 builds being rolled out, security outfit Kaspersky is getting its way. Microsoft announced in a blog... Read more...
Do you need a password manager to keep track of all your obscure, special character-filled and lengthy passwords necessary for various websites? It used to be that we would pick a simple, single password for multiple accounts and websites... Read more...
There is a big push for solid state drive (SSDs) to transform the data center storage market, and Intel is banking on a new form-factor to help spur that transition. The company has announced its new “Ruler” SSD form-factor, which... Read more...
First ... Prev 64 65 66 67 68 Next