Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

This week, something nearly as common as breathing happened: a severe Adobe Flash vulnerability was revealed. How this one came to be, however, is far more interesting than most. Earlier this week, a well-known Italian hacking group called... Read more...
The developers behind the uber-popular Plex media center software have revealed that their databases have been breached, and of course, that means just one thing: you might have a password or two to change. In an email sent to affected... Read more...
Microsoft's Windows 10 Mobile looks to be a tremendous upgrade over the previous version (the same could be said about the desktop versions as well), and features like "Wi-Fi Sense" could help set it apart from the rest. But, as cool as... Read more...
A new device from an MIT alumnus will soon be helping police assess dangerous situations from a safe distance. The softball-sized explorer triggers its six cameras when tossed into a room. It then sends the images back to police, where... Read more...
Maybe someday the Chinese government will take a page from O.J. Simpson and write a book titled, "If I Did It: Confessions of a Hacker." After all, China is clinging to the innocence card just as adamantly as Simpson, never mind any... Read more...
Anyone who follows the NAS game will likely recognize the name Synology, but we’d wager most home users aren't quite as familiar with them. That’s simply because Synology storage devices have typically targeted a more advanced crowd, such as readers of this website. If you had ever met someone... Read more...
Researchers at Tel Aviv University have developed a tool for stealing decryption keys from laptops. What sets the tool apart from other hacking tools is that it is untethered: it doesn’t need to connect to the target laptop (nor a hacker’s laptop) to operate. And, it’s small. As researchers... Read more...
Windows XP enjoyed a nice, long run, but after over a decade of faithful service, Microsoft finally pulled the plug on the legacy operating system and discontinued support in April of last year. All but the most diehard fans have since... Read more...
Adobe's Flash Player has more holes than Swiss cheese, only Swiss cheese doesn't leave you vulnerable to hacker attacks. Flash Player often does, and yet again, there's a zero-day exploit that could allow an attacker to take control of an... Read more...
Earlier this month, Microsoft offered more details and availability information for its forthcoming Surface Hub system. With pre-orders starting July 1st, these 55-inch or 84-inch machines offer a new collaborative version of the Surface... Read more...
If the state of the US government's security wasn't appalling before, it sure should be now. Earlier this month, we reported on a breach of government systems that saw the information of four million current and prior government employees... Read more...
Following reports that 600 million Samsung phones are vulnerable to a security flaw that could allow an attacker to remotely execute code as a privileged/system user, the South Korean handset maker said a fix is on the way. Samsung also... Read more...
If you didn't know what HTTPS was two-years-ago, chances are you're familiar with it now. Ever since Edward Snowden blew the whistle on NSA spying, the world has gradually been improving its efforts to to protect its data - either at the user or government level. Last fall, Google said that... Read more...
Major League Baseball has worked hard to improve its image and move on from the so-called steroids era, a period in baseball where many records were broken by players who were later found to have been doping up and using human growth... Read more...
"Xara" might sound like a cool name for an exploit, but according to researchers at three different US universities, it's one that should cause some alarm. At its root, if Xara is properly exploited, attackers would be able to procure... Read more...
The pre-installed keyboard found on more than 600 million Samsung mobile devices has a vulnerability that could allow an attacker to remotely execute code as a privileged/system user. Ryan Welton, a researcher with mobile security firm... Read more...
Microsoft this week announced that web searches made using the company's Bing search engine will soon be encrypted by default. In actuality, users have been able to encrypt searches made via Bing for around a year and a half now, though sometime before summer comes to an end, it will be a... Read more...
The parade of banks, insurance companies and retailers that have suffered data breaches has caused many people to store their passwords with sites like LastPass. The security company creates a unique password for each of the user’s logins and provides access to those passwords via a single... Read more...
Google is putting up some serious cash in hopes that security researchers and Android dissectors in general will root out security vulnerabilities in exchange for monetary rewards. The expansion of its bug bounty program over to Android... Read more...
Remember when skirmishes were fought on land, air, and sea? They still are, though in today's world, you can add cyberspace to the list. Cyber warfare has become a point of focus, and lest anyone doubt it, consider that that the U.S. Navy... Read more...
Federal Communications Commission (FCC) chairman Tom Wheeler has asked the wireless industry to voluntarily support the addition of features that would make it more difficult and/or less desirable for for thieves to steal mobile phones. A couple of the measures the FCC would like to see... Read more...
Jan Souček, a security researcher from Prague, has uncovered a vulnerability in the security of the iOS Mail application that nefarious types can deploy against users of the app to gain access to their iCloud passwords. The method... Read more...
First ... Prev 85 86 87 88 89 Next