Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

2015 has proven to be a massive year for Adobe's Flash plugin, but for all the wrong reasons. Flash is already infamous for being one of the most vulnerable pieces of software on the planet, but in 2015, 316 bugs were found and squashed. That comes out to about 6 bugs per week for a piece of... Read more...
If were experiencing random weirdness and seeing other player's personal information when you log into Valve's Steam online gaming service today, you're not alone and no, you don't have to worry about some sort of holiday zombie attack on... Read more...
Password security is one of those things you either have or you don't. If you're password is a combination of alphanumeric characters and symbols with varying punctuation, congratulations, you're in much better shape than the guy who uses... Read more...
Shortly after we published our AC3200 router roundup, Linksys contacted us and wanted to throw one of its routers into the ring. We agreed, and the company sent us its Linksys EA9200 Tri-band Smart Wi-Fi router, which like the others in the roundup is a tri-band router that uses the Broadcom... Read more...
A hot topic brought up often in the search for America's next president is the security and privacy of the country's citizens. Unfortunately, such matters rarely find themselves in the hands of politicians who truly understand what they're... Read more...
Since its introduction in Internet Explorer 7, Microsoft has helped keep users safe from malware and browser hijacks with SmartScreen. The company went on to introduce SmartScreen as a feature of Windows itself, able to detect malicious... Read more...
Over the past couple of years, we've discovered case after case that highlights the extent the US government is willing to go to spy on whoever it can. It's an interesting juxtaposition, then, to keep learning about new revelations that... Read more...
Want to feel like the ultimate hacker, like those in the 1995 cinema classic Hackers? Quick: find the nearest Linux PC, boot to the GRUB2 bootloader, and hit Backspace 28 - and only 28 - times. Yes, really. Hector Marco & Ismael Ripoll... Read more...
Late last month, toy maker VTech was hit with a debilitating attack that resulted in an incredible amount of customer data winding up in the wrong hands. Given VTech's abysmal security measures, it's hard to consider it being a "victim" in... Read more...
Google is no stranger to accusations of invading user privacy, but the latest one comes from Electronic Frontier Foundation (EFF) and relates to a highly sensitive market: education. Google would like to see its Chromebooks in the hands... Read more...
Canadian phone maker BlackBerry today announced that it's pulling out of Pakistan next month due to government requests to monitor communications of its customers. Even though BlackBerry's struggling to regain share of the global... Read more...
While many of us were seeking out the hottest deals this weekend, the US government carried out the greatest reduction of its spying efforts since they were expanded-upon following the attacks of Sept 11, 2001. Adhering to a law passed... Read more...
Some Amazon shoppers report having received an email from the online retailer to let them know that their passwords have been reset. Usually that's cause for concern, such as a security breach -- something that's become all too common as... Read more...
We’ve all heard about Wi-Fi — the ubiquitous wireless networking standard is commonplace in just about all of our gadgets (smartphones, tablets and notebooks) and even our cars, as well as some home automation and IoT products. It’s hard... Read more...
When Microsoft released Windows 10 to retail at the end of July, it followed a number of months of ever-growing hype. That, coupled with the fact that the company let regular users help test the OS for nine solid months prior, gave it a... Read more...
It's no secret that a countless number of mobile apps indulge in a bit more of our data than we'd like, and many even handshake with external servers, causing us to wonder what on Earth they're doing. Well, as some researchers at MIT have... Read more...
Dual drive setups are becoming more and more common as Solid State Drive (SSD) prices plummet.  Pairing a solid state boot drive with a multi-terabyte hard disk drive affords fantastic performance without paying a premium for your extra... Read more...
Dozens of Starwood hotels around the country were hit with malware that enabled cyber thieves to access credit and debit card information from point of sale terminals. The malware affected a variety of locations on Starwood properties... Read more...
We've talked lots in the past about vulnerabilities that hit home and enterprise routers, but not quite as much about cable modems, where the importance of good security is arguably even more paramount. The reason for that is that most... Read more...
Let me start by saying that Siri and I have a solid relationship. If I need directions to a place I've never been before or a reminder set, she dutifully obliges every single time. I like that. But if Siri turns on me and starts sharing my... Read more...
Rarely does a day pass when we don't write news about something that should reaffirm your belief that security is something to be taken seriously. Whether it's an online game, a retailer, or a bank, we've seen time and time again that no... Read more...
Have you ever seen a browser littered with toolbars and other junk that doesn't belong? A common trick used by malware and adware writers is to inject DLLs (Dynamic Link Libraries) into the browser, which bypass the built-in interfaces for... Read more...
First ... Prev 80 81 82 83 84 Next