Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) researchers say they have discovered an unpatchable vulnerability affecting Apple's custom Arm-based M1 silicon at the chip's last level of defense. Since it is not possible to patch out the flaw, are owners of M1 devices sitting ducks? Not... Read more...
If you thought AMD would only talk about dollars and cents at its Financial Analyst Day event, think again. Sure, AMD CEO Dr. Lisa Su shared plenty of data on TAM growth opportunities and ongoing investments, but it’s all predicated on a wide-ranging portfolio of compute and graphics products for both consumer and... Read more...
Yesterday, we reported on a data breach at Shields Health Care Group that resulted in the theft of personal information belong to 2 million Americans. Oftentimes, data stolen in breaches like this end up on online forums or marketplaces where cybercriminals buy and sell these ill-gotten gains. Lately, US law... Read more...
Personal information is also valuable information, as personal data in the wrong hands can empower cybercriminals to commit identity theft and fraud. However, even those who take important steps to secure their personal information can have it exposed when an employer, health care provider, government agency, or other... Read more...
We're halfway into 2022 and security researchers have started to publish data on emerging trends in cyber-security. The emerging trend that seems to be catching researchers attention today happens to be related to the largest, widest, and most diverse distribution of computing devices on the planet, mobile... Read more...
Malware and virus threats are practically commonplace, even a daily occurrence for some users these days. Unfortunately for many users in the Microsoft ecosystem, leveraging popular Office applications is a common security attack vector for many of the ne'er-do-wells of the Internet. In that regard, Microsoft's... Read more...
Another week, another malware attack vector has become increasingly popular amongst malicious software distributors. The vector has existed since late 2021, but it is potentially bad for Linux enthusiasts who use Windows. Said attack vector that has gained in popularity is a utilization of the Windows Subsystem for... Read more...
The only real certainties in life are death, taxes, and scammers trying to swindle you out of your money. In the digital age, that means phishing scams run rampant, as it's a relatively low effort and potentially high reward ruse. Some efforts are more convincing than others, perhaps such as the one that is targeting... Read more...
Windows updates are typically supposed to patch security holes, add new features, improve performance, increase stability, or offer some combination of all those things. They're not supposed to leave your PC in worse shape then before they were installed, though that sometimes happens. That's the case right now for... Read more...
Barring any regulatory hurdles, Broadcom is buying virtualization giant VMware for around $61 billion in a cash and stock transaction, the two companies announced today. The sale amount is based on the closing price of Broadcom's common stock on May 25, 2022, and as part of the deal the company will assume VMware's $8... Read more...
Google has begun rolling out another update to its Chrome browser on all the major desktop platforms (Windows, Linux, and Mac) and there are at least 32 reasons why you should apply it sooner rather than later. That's the number of security fixes the latest update includes. If you're looking for just one very good... Read more...
Cybersecurity experts are constantly trying to improve user account security. This task can be a difficult one when users don’t take basic steps to secure their own accounts. A recent report found that the most commonly used passwords among business executives are “123456” and “password.” However, even accounts... Read more...
Earlier this month, Clearview AI reached a settlement agreement with the American Civil Liberties Union (ACLU) over the company’s usage of Illinois citizens' biometric data without their consent. Clearview AI sells its recently patented facial recognition technology to both private companies and government agencies... Read more...
Facebook does not have the best track record when it comes to its privacy. However, there are a few things you can do as a user which can help protect your account and personal information from other users. Social media apps have become the hub where people go to connect to both old and new friends alike. Being... Read more...
It seems that every day a new malware threat rears its ugly head. Every once in a while though, the new threat is a version of an old threat. For example, PDFs as a method of malware delivery. That's what researchers at HP Wolf Security have recently found. A less common, but seemingly effective method of malware... Read more...
The past week, Vancouver was the site of the 2022 Pwn2Own contest, a timed test of skills for hackers and cybersecurity experts. This year marks the 15th anniversary of the contest, and 2022's gathering didn't disappoint. 17 contestants attacked 21 targets, including Apple's Safari browser, Windows 11, and even the... Read more...
In what seems to be the year of security breaches and threat actors thieving or or holding data for ransom, defenders, or blue teamers, cannot seem to catch a break. However, just after announcing that it had hit a major component supplier for Boeing and Lockheed Martin, it appears that the Conti ransomware gang as we... Read more...
Security researchers from the Technical University of Darmstadt in Germany have found that even if an iPhone has been powered off, some segment of its wireless connectivity remain active in the device. Most notable is Bluetooth, though NFC and Ultra-Wide-Band both may remain active as well. Through the Bluetooth... Read more...
No one in computer security can catch a break lately, it seems, as yet another two major cybersecurity flaws have been found related to web servers. Named Sysrv-K by security researchers on Microsoft's Security Intelligence Twitter, te vulnerabilities install botnets, which will run a crypto-coin miner on infected... Read more...
May 2022 has not been a good month for operating system updates. Microsoft had a problem with Active Directory and later driver crash blue screens of death (BSoD). Now it appears Apple has zero-day security exploit problems affecting many of its major platforms, including macOS, watchOS, and tvOS. An emergency fix... Read more...
The beginning of the year saw a flurry of stories about security breaches as the cybercriminal gang known as LAPSUS$ stole data from an alarming number of big name companies in a short period of time. However, while LAPSUS$ is no longer in operation, after the London police arrested all seven members of the group... Read more...
On the 10th of May this year the patch Tuesday updates for Windows started rolling out. Unfortunately, as almost always seems to be the case, there are more and more problems piling up. Of course, the first issue people started reporting was related to servers who use Kerberos and Domain Controllers on server... Read more...
First ... Prev 6 7 8 9 10 Next