Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

A couple of weeks ago, reports hit the Web claiming that Chinese phone maker Xiaomi was sending user info back to home base. At the time, the company's head of global expansion, ex-Googler Hugo Barra, claimed that no such thing was going... Read more...
As the owner of two cats that have been indoor pets their entire lives, I couldn't imagine letting them wander outdoors. If that wasn't the case, though, I know exactly what I'd do: I'd make their adventure, my adventure. That's just what security researcher Gene Bransfield did with the... Read more...
Call it the 'Edward Snowden' impact if you must, but there's no doubt that insight on the NSA's activities have technology companies working overtime to restore and regain trust. Following Google's lead to encrypt email communication... Read more...
China's concern over security and U.S. spying habits apparently don't extend over to popular Apple products like the iPad and MacBook Air as previously thought. Responding to a Bloomberg report earlier in the week saying that China removed... Read more...
We talked last week about the latest security issue to plague Google's ultra-popular Android OS, which at the time topped-off what seems like a never-ending list of issues researchers raise about the OS. With a just-released Cisco report... Read more...
More details have surfaced on how the FBI uses its own custom malware to penetrate the Tor network's anonymizing service -- and while those tools have been deployed in some important investigations, it's sure to raise hackles in the... Read more...
BlackBerry's bread and butter has always been the enterprise sector, and in a bid to make sure it retains that market, the Canadian handset maker went out and acquired Secusmart, a major player in high-security voice and data encryption... Read more...
Another day, another report of a potential hack that could cause some real trouble. Researchers at Berlin's SR Labs have discovered that firmware can be rewritten on any sort of USB device, be it a keyboard, a mouse, or a flash drive... Read more...
Google's Android OS has received its fair share of flack over the past couple of years for its security issues, but sometimes, it's not the company or its OS at fault: It's the third-party developers. Proof of that can be seen from the... Read more...
Big trouble in China? We're not sure, though reports are surfacing that Chinese government officials have been making unannounced visits to Microsoft's offices in China. Microsoft is keeping mum on the visits, and so is China's State... Read more...
It goes without saying that technology can be amazing, but at the same time, some aspects of it can be downright scary. The latest example of that comes from Oxford, where a team of researchers have developed "e-DNA", a foolproof solution... Read more...
It looks like Tesla has a few security vulnerabilities to address. That much became evident after Chinese hackers participating in a hacking competition at the annual Syscan conference in Beijing took advantage of a vulnerability in a... Read more...
Don’t freak out, but Facebook is testing a new feature that would put “Buy” buttons on ads within the social network. Simply, users would see an ad, and the ad would have a button that you could click to purchase the item you see, all without leaving Facebook. This is an... Read more...
In case you hadn’t heard, data breaches are a problem--a huge problem--and to quantify that somewhat, New York AG Eric Schneiderman released a report detailing his state’s data breach information including the costs involved... Read more...
Sure, you may feel like you're ready to take on the world after a good night's rest -- after all, you stayed at a Holiday Inn. Or perhaps you crashed at a Motel 6 where they leave the light on for you (yes, we watch too much television). Regardless of where you plan to spend the night during... Read more...
IT admins would do well to prepare themselves for a rather large collection of security updates that Oracle is planning to release this Thursday. The updates are supposed to fix precisely 113 security vulnerabilities that a apply to... Read more...
It has been almost two years since AMD launched the FirePro W9000 and kicked off a new battle in the workstation GPU wars. Today, we're reviewing the company's FirePro W9100 -- a new card based on the same Hawaii-class GPU as the desktop R9 290 and R9 290X, but aimed at the workstation market and professional consumers. Does... Read more...
China made headlines the world over yesterday when its state media declared that Apple's beloved iPhone poses a threat to national security. With such a grand accusation, we knew that it wouldn't take long for Apple to speak up, and... Read more...
We've been around the block enough times to know that outside of setting a storage medium on fire or some other equally extreme measure, all data is recoverable, it's just matter of time, money, and overall desire. However, it was still... Read more...
When NSA whistleblower Edward Snowden came forth last year with the US government's spying secrets, it didn't take long to realize that some of the information revealed could bring on some serious repercussions - not just for the US government, but also for US-based companies. The latest to... Read more...
It's standard practice to factory restore an Android device before flipping it on eBay or Craigslist, but the amount of recoverable data you leave behind might shock you. Those nude selfies that were only intended for your special friend?... Read more...
So it’s not just us then. While we seethe over NSA spying allegations here in the U.S., ISPs across the pond who believe they were spied upon by the UK’s intelligence agency GCHQ in the wake of Edward Snowden’s leaks are... Read more...
First ... Prev 96 97 98 99 100 Next