Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

2016 is going to be remembered for a number of fortunate and unfortunate things, with one topic that falls into the latter category being the debacle of U.S. law enforcement vs. Apple. The FBI and other US federal agencies have made it no... Read more...
We recently witnessed a new and disturbing trend in cyber security and that is the widespread hacking of Internet connected devices to initiate DDoS attacks on an unprecedented scale. That is the method that made possible the Mirai botnet... Read more...
Security researchers have found a rather alarming vulnerability in Linux that could ultimately allow an attacker to copy, modify, or destroy the contents of a hard drive, along with with configure the network to exfiltrate data. That in... Read more...
The Federal Bureau of Investigation made a big deal out of Apple's unwillingness to help it crack a locked iPhone 5c handset that was used by a terrorist in the deadly San Bernardino shooting, but it turns out it rarely needs assistance... Read more...
We hate to break it to you, but your PC is not as secure as you think. That remains true even if you lock your computer with a password. Should you leave your system unattended, it would be possible for someone to hack into it in less than... Read more...
Artificial intelligence is at the center of several evolving and next-generation products and services, everything from video games and smartphones (virtual digital assistants and messaging) to self-driving cars and web searchers. It has... Read more...
Forget everything you know about workstations, or at least dismiss the preconceived notion that systems serving up server grade power are typically as big as they are powerful. That might have been the case before, but HP just turned the... Read more...
In what is being described as the largest security breach of 2016, hackers stole over 400 million user credentials spanning two decades of customer data from Friend Finder Network, Inc., the company that owns and operates several... Read more...
Anyone who is looking for a reason to install the Windows 10 Anniversary Update (build 1607) need only consider that there has never been a more secure version of Windows. So says Microsoft, which made the claim in conjunction with a new... Read more...
Yahoo is again catching fire over a security breach dating back to 2014 that compromised the accounts of 500 million users, though this time the criticism is aimed at Yahoo's lack of timely disclosure. The company fessed up earlier this... Read more...
Google has a message for webmasters serving up malware and it goes something like this: Fool me once, shame on you. Fool me twice, shame on me. Going forward, Google is plugging what it calls a "gap" in its online protection scheme that... Read more...
What's that in the air? Could it be the smell of egg nog and pine? Nope, it's Microsoft Patch Tuesday, of course! This month's rollout is rather large and notable for a number of reasons. However, what matters most is that if you're not... Read more...
Ahmed Mehtab, a student from Pakistan and the CEO of Security Fuse, is in the running to score a $20,000 payday from Google's bug bounty program. While there remains some red tape to clear, Mehtab is likely to receive the bounty for... Read more...
There's been no shortage of stories regarding Android security of the years, a fact that has worried some fans of the "openness" of the OS. Each new security story makes it seem more likely that the OS will become a little more... Read more...
Once again Google and Microsoft are at odds over the former's decision to disclose a zero-day vulnerability affecting the latter's Windows operating system. Google alerted both Adobe and Microsoft on October 21, 2016, of previously... Read more...
Twitter needs to get a handle on its Promoted Tweets feature and it needs to do it quickly. The problem has to do with vetting, or lack thereof. We don't know how widespread the problem is, but there is at least one Promoted Tweet going... Read more...
There are many different ways of hacking into a person's email account. Some are rather sophisticated and involve a lot of effort, while on the end of the spectrum a scheme known as phishing is one of the easiest methods—all you need is a... Read more...
Consumer WiFi router products are generally classified by three major performance characteristics: overall throughput or bandwidth, multi-client performance, and range. Although throughput and multi-client bandwidth has scaled-up nicely over the years, range perhaps hasn't improved quite as... Read more...
You might think that storage makers are 100 percent focused on solid state drives these days, but that isn't the case. Mechanical hard disk drives (HDDs) still offer the best price-per-gigabyte ratio for bulk storage duties, and to keep... Read more...
Whether you use Linux at home or manage a Linux server, you'll want to waste no time in making sure your OS is completely up-to-date. An exploit called "Dirty COW" has now been revealed, and while it's not the most dangerous one ever... Read more...
One of the many perks of working at a publication like HotHardware is that we get to attend a wide array of different technology-related events. GPU Tech Days, the Consumer Electronics Show, processor deep dives, smartphone launches -- you name it, and we're there. This Notebook Still Worked After Being Thrown Off The Boat Onto The Rocks Below...... Read more...
Maybe he’s the hero the United States “deserves, but not the one it needs right now”. It looks like the United States has its own hacking Dark Knight. American vigilante hacker “The Jester” gained unauthorized access to the Russian... Read more...
First ... Prev 71 72 73 74 75 Next