Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Russian hackers are thought to be targeting reporters and major news outlets, including The New York Times, which confirmed that its Moscow bureau was the target of an attempted cyberattack this month. The news agency hasn't found any... Read more...
We hear about hacks and attacks on web services all of the time, and often, there's a big reason behind it. The attackers either want to fetch information for their financial gain, or just to simply cause havoc. In this latest case... Read more...
We reported earlier this week on a large collection of exploits that have been put up for auction by a group that calls itself Shadow Brokers. The promise was that all of the files were sourced from a secret NSA group called Equation... Read more...
We wrote a couple of days ago about a huge treasure trove of alleged NSA-derived exploits that were hitting the market. That gold mine was accessed by a group calling itself Shadow Brokers, and it's been said that their source was Equation... Read more...
NVIDIA has just announced that its first-ever DGX-1 deep-learning server has found a home, and it couldn't be more appropriate. That new home is with OpenAI, the world's largest non-profit artificial intelligence research agency, which is... Read more...
Today's a bad day security. First it was discovered that Microsoft accidentally leaked what amounts to a golden key for Secure Boot system, and now we find out there's a rather serious vulnerability in the TCP implementation in all Linux... Read more...
Someone at Microsoft is having one of those Southwest moments where the airlines asks, "Want to get away?" That's because someone at the Redmond outfit leaked a security key that could allow attackers to bypass the protections in Windows... Read more...
Go ahead and cue up Cartman's "No kitty, that's a bad kitty!" soundbite, only this time it's not in reference to stealing those delicious Cheesy Poofs. McAfee's mobile malware research division found a sample of ransomware for Android that... Read more...
If you thought that Samsung’s monstrous 15.3TB PM1633a SAS solid-state drive (SSD) was impressive, you ain’t seen nothing yet. Seagate strutted into the Flash Memory Summit this week touting a new SAS SSD that offers four times the storage... Read more...
MICROS, one of the largest point-of-sale payment systems in the world, has been hacked by a Russian organized cybercrime group with a history of hacking into banks and retailers. The full extent of the security breach is still being... Read more...
Check Point, the company that's perhaps best known for its ZoneAlarm security software, found four vulnerabilities that put at risk most Android smartphones tablets. Collectively called QuadRooter, Check Point's mobile research team says... Read more...
Some people take Grand Theft Auto V a little too seriously, either that or just live that sort of life for real. Houston police officers have just announced that they have arrested two men accused of stealing at least thirty Dodge and Jeep... Read more...
It's no surprise that a number of exploitable security holes still exist in the operating systems we use each and every day. It's just the nature of the beast; we're talking about software that has hundreds of millions of lines of code... Read more...
Even Apple's software isn't immune to security holes and vulnerabilities. An admission of such by Tim Cook and the gang comes in the form of a new bug bounty program Apple announced at the Black Hat conference today in Las Vegas, Nevada... Read more...
Law enforcement officials found a way to unlock a murder victim's Samsung Galaxy S6 by using specially printed copies of fingerprints on file from a previous conviction. It wasn't easy thwarting Samsung's biometric security, but with the... Read more...
There's an Apple parody that jokingly proclaims "Gold is best!" in reference to the gold colored iPhone handsets, but for Western Digital, gold really does represent the top of the line. WD Gold that is, a series of datacenter hard drives... Read more...
If you're a SwiftKey user and have been experiencing some oddities lately: you're not alone. Due to a bug, some SwiftKey users have been receiving some downright bizarre recommendations, including phrases that they never use. Even worse?... Read more...
Nothing beats wireless for convenience, but whenever you transmit important data through the air, there's a risk that someone could be nearby, ready to intercept the signals before they reach their destination. If this sounds familiar, it... Read more...
At this point we've reviewed quite a few high-end AC routers, including tri-band routers, flagship dual-band models, and even the latest MU-MIMO devices too. However, the one portion of the market we haven't covered much is the one that... Read more...
Law enforcement officials are seeking help from a professor at Michigan State University with creating a special 3D printed replica of a homicide victim's fingers in order to unlock his phone using his fingerprints. In theory it sounds... Read more...
We reported earlier on France's demands to Microsoft with regards to bolstering its Windows 10 OS to better protect user data, and ultimately, their privacy. The fact that a watchdog would target Microsoft for collecting too much data... Read more...
The same hacking group that claimed responsibility for ticking off every Pokemon Go player on the planet by overwhelming the game's servers with a DDoS attack last weekend is planning another attack. Poodle Corp, as the hacker group calls... Read more...
First ... Prev 74 75 76 77 78 Next