Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Google has long offered some serious protection in its Chrome Web browser from malicious software, and in some cases, I'd almost call it too protective. Nonetheless, the warnings the browser provides are good, because as unfortunate as it... Read more...
Dutch SIM card maker Gemalto has been enduring unwanted media attention for the past few weeks after reports surfaced that Britain’s GCHQ and the United States’ NSA may have breached the company’s networks. Today, Gemalto released a... Read more...
Lenovo had a rough go of it over the past few weeks. First, news broke that Lenovo had installed Superfish (widely regarded as adware) on some of its notebooks. As public outcry mounted, Lenovo offered a public apology and provided... Read more...
Conventional wisdom in years past was that hackers didn’t bother to exploit Apple’s OS X operating system because its relatively insignificant market share didn’t warrant wasting resources to exploit it. The reasoning was, why bother with... Read more...
As we reported on late last week, the world's largest SIM card maker was broken into digitally as part of a joint operation between the United States' NSA and United Kingdom's GCHQ. The attack, which began back in 2010, gave these agencies... Read more...
What a week it has been for Lenovo. Often considered one of the best of the notebook vendors, it was discovered earlier this week that the company in recent months had been bundling some seriously shady software on many of the PCs it sold... Read more...
When the U.S. State Department’s email was hacked back in November, it was a black eye for the government. But, to many of us, this seemed the sort of problem that would be quickly eradicated – after all, our guys are the no slouches when... Read more...
It feels like we can't go a single week without learning of some new strain of Android malware, but for the most part, it's rare when we learn of one that introduces a brand-new design or unique mechanics. Well, a nameless piece of malware... Read more...
It hasn't even been a single week since we learned that the NSA could have been involved in creating a bunch of malware that trickled out over the past decade, and already we have another scandal to munch on. Unfortunately, this one is... Read more...
Purchasing a new laptop can sometimes be a chore. For starters, simply finding one that's "right for you" takes time and effort, and once you do find it, you know that the "chore" part isn't over. Once you get that baby home, you'll have... Read more...
Samsung has confirmed that some of its slightly older Smart TV models are currently uploading recorded voice communication without any form of encryption to protect the user's privacy. This goes against what Samsung stated in a recent blog... Read more...
Security firms the world over dream of a day like this, but this one belongs to Kaspersky. The Russian-based firm has discovered the existence of a threat actor that could be linked to the US Government, and NSA in particular. Kaspersky... Read more...
Silicon Valley is getting a visit from President Barack Obama today, where he will sign an executive order to promote cooperation between the government and tech companies in the fight against large-scale data theft. The order will... Read more...
It's not often that someone in the possession of a massive collection of passwords is willing to let it loose, and it's for good reason. It's perhaps for even greater reason why we so rarely see someone release a database that has both the... Read more...
It's bad enough when you're in possession of a database containing 80 million customer records and it gets hacked. But what's even worse than that is when you fail to encrypt all that data. Such is the unfortunate situation facing Anthem... Read more...
Last year was a busy one for hackers, and it doesn't look like 2015 will be much different. The latest to get hit is Anthem Inc., the second-largest health insurer in the United States. While investigators are still determining the extent... Read more...
Until the web at large adopts the open HTML5 Read more...
When engaged in war, it's of utmost importance to keep plans and secrets secure. On the other side of the coin, it's likewise important to do what you can to gather intelligence on the opposition -- something quite difficult given the... Read more...
Apple has yet to reveal pricing information for the high-end versions of its Apple Watch products (only the entry-level Sport edition has been priced; it will set you back $349), though like most of the company's products, we'd be... Read more...
Sometimes, it just makes sense to go open source. We've seen Microsoft do it, and we've seen Google do it. Now, we see none other than the US Department of Defense do it, with DShell, a network foresnics tool. It's an impressive thing to see the DoD release a home-built tool to the wild... Read more...
Intel promises a lot with its just-announced fifth-gen Core vPro processors, but if there's one overarching theme, it's that the company wants you to be wireless -- even if you need to take advantage of a big screen. Three major focuses... Read more...
It should strike no one as a surprise at this point that the US and China have a bit of a strained relationship when it comes to trust. Both have accused each other of cyber offenses, and likewise, neither has much faith in the products it... Read more...
First ... Prev 89 90 91 92 93 Next