Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

A security researcher who goes by the name “RyeLv” recently discovered an elevation of privilege vulnerability in Windows. Microsoft has publicly disclosed the vulnerability and registered it in the Common Vulnerabilities and Exposures (CVE) system with the name CVE-2022-21882. The National Institute of Standards and... Read more...
Many websites and applications employ various device fingerprinting methods to identify users and track their activity across websites and applications over time. The Electronic Frontier Foundation has a good explainer on this subject, as well as a tool to test how well your browser protects you from fingerprinting... Read more...
A Two-Factor Authentication (2FA) app that's been making the rounds on Google Play could steal your banking information, say researchers at Pradeo, a mobile security research and product provider based out of France. According to the team, the app was removed from the Google Play store, however, it remained active and... Read more...
Remember what life was like before the advent of social media? Such a time feels like ancient history, and many people these days juggle multiple social media accounts, such as Facebook, Twitter, Instagram, and a host of others. They're all super popular, and so it's no surprise that the Federal Trade Commission (FTC)... Read more...
A new Android scamware scheme may have cost unsuspecting smartphone owners hundreds of millions of dollars. Dubbed “Dark Herring” by Google App Defense Alliance member Zimperium zLabs, it’s been spotted in 470 different applications on the Google Play Store since it first showed up in March 2020. The fraudulent... Read more...
Apple has released an update for your iPhone that you are going to want to download as soon as possible. Update iOS 15.3 includes a patch to fix a security vulnerability in Safari that could leak your browser history, as well as a second fix for a memory corruption bug that affects iOS, iPadOS, and macOS... Read more...
If you haven't been keeping up with Windows news, Windows 11 is really trying to be tough on security. As part of that push, one of its major requirements is that your system must have a Trusted Platform Module, or TPM. Historically speaking, that was a physical device on your motherboard that provided an immutable... Read more...
Even with malware attacks against Linux on the rise, a major security vulnerability has somehow been lurking in every Linux distribution for a dozen years. Just hours after the bug became public, a proof-of-concept (PoC) exploit showed up in the wild. The problem lies within a system utility called Polkit, which... Read more...
If you're not a Linux sysadmin, you might not be familiar with Control Web Panel, but if you are a Linux sysadmin, you almost certainly are at least aware of the app. Control Web Panel, or CWP, is a free Linux control panel for various web services. It used to be called CentOS Web Panel, but these days it's supported... Read more...
Samsung has built a fingerprint security chip that is aimed at making payment cards and other types of biometric cards more secure. The new security solution combines a fingerprint sensor with other technology in order to strengthen your payment cards against thieves. In a day and age where carrying cash is... Read more...
It felt like we were constantly reading about data compromises last year. Unfortunately, this statement is not far from the truth. According to the Identity Theft Resource Center (ITRC), there were 1,862 data compromises in 2021. The overall number of data compromises was up by 63% from 2020 and the number of... Read more...
Scanning a QR (Quick Response) code sure is an easy and convenient way to access information, like a restaurant's menu, but be careful of scanning codes willy-nilly. The US Federal Bureau of Investigation (FBI) felt compelled to issue a warning about cyber-criminals tampering with QR codes to ultimately steal your... Read more...
WhatsApp users may soon be able to migrate their chat history from an Android phone to an iPhone. Incidentally, the chat migration feature is already available for users moving their chat histories from iPhone to Samsung Galaxy and Google Pixel phones. When it comes to messaging apps, WhatsApp is one of the most... Read more...
This week, a security vulnerability in Dark Souls 3 was discovered, allowing remote code execution (RCE) and any threat actor to wreak havoc on your PC. As this vulnerability only affects players who play online, potentially across the Dark Souls series, servers have been switched offline, and it seems Dark Souls... Read more...
When people think of malware and malicious code, they might imagine an infected file or download from a sketchy email or website on their computer. However, this sort of infection is realistically only the tip of the iceberg and often some of the least sophisticated. Researchers at Kaspersky have found a complex... Read more...
Windows Updates are great when they work properly, but many users like to have more control over when and how they update their OS. Microsoft's TechCommunity Blog, however, says there are a bunch of things that you probably should not attempt to control yourself. Power users and system administrators commonly use... Read more...
Imagine it's the year 20XX. Hopefully you're healthy. You're also sitting on your front porch watching Amazon's package drones whiz through the skies while awaiting your own delivery. It slowly starts to prepare for landing before suddenly veering off somewhere else! What happened!? Well, Michigan State University... Read more...
To the casual observer, the world of cryptocurrency may seem like the modern version of the Wild West. It definitely doesn't help the optics when hackers infiltrate one of the leading cryptocurrency exchanges, Crypto.com, and swipe $15 million worth of Ethereum, as a blockchain security and data analytics company... Read more...
AMD is fleshing out its current-generation Radeon Pro lineup with RDNA 2 underneath the hood with the introduction of the Radeon Pro W6400. It slides into the lineup beneath the existing Radeon Pro W6600 for medium to high-level workloads, and the Radeon Pro W6800 designed for high to extreme workstation workloads. So... Read more...
If you’re a Safari user, either on desktop or iOS, it may be time to change browsers, at least temporarily. More flaws have been uncovered in Safari’s tracking prevention system. In this case, a bug within Safari 15 means that any website is able to track all of your internet activity and even reveal your... Read more...
Microsoft has been toppled from its position on at least one list, but it’s doubtful the company is too upset over it. International shipping service DHL took the No. 1 spot as most-imitated (spoofed) brand in phishing attacks for the fourth quarter of 2021. In many phishing attacks, the attacker tries to fool the... Read more...
Linux used to be considered fairly safe from malware. Few, if any, threat actors targeted the Unix-based operating system. That’s changing rapidly, though, as reports indicate malware for Linux increased by 35 percent in 2021, compared to the previous year. Linux is commonly used for Internet of Things (IoT) devices. With more people adopting Read more...
First ... Prev 19 20 21 22 23 Next