Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews
In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.
The Raspberry Pi is terrific for plenty of uses, from retro-style gaming to running an extremely low-cost server. A team of researchers have discovered another new use for Raspberry Pi: hands-off malware detection.
While most virus and malware detection depends on file signatures and behaviors, this new project...
Read more...
It is a good idea to always be wary of packages, especially if you are not expecting one. The United States Federal Bureau of Investigation (FBI) recently warned American companies that cybercriminals are sending USB drives with ransomware in the mail. The cybercriminals have attempted to mimic legitimate institutions...
Read more...
In another example of social engineering’, an unpatchable bug has been discovered in iOS. This ultimate persistence bug makes you think your iPhone has been shut down when it hasn’t. Once in effect, it’s a trivial matter for nefarious individuals to activate your iPhone’s camera and microphone to spy on you.
The...
Read more...
Many people have returned to work after a long holiday break only to discover that their messages are not sending, their computer is behaving slowly, and/or they are faced with a black screen. There is thankfully an end in sight. Microsoft recently issued patches for the “YSK22” Exchange mail and black screen...
Read more...
Normally, New Year’s Day is a time to relax, reflect and recover from the previous night’s festivities, but for System Administrators this year, that is not the case. Reminiscent of the Y2K scare at the turn of the century, a new bug has appeared, causing Microsoft Exchange servers to fail and forcing admins to...
Read more...
It's a good idea for big organizations to hire security researchers for help securing their systems. No matter how much effort you put into something (like securing your network), it can sometimes require a person looking at it from a different angle to point out a problem you couldn't see.
Given that lede and...
Read more...
You may not be aware of this, faithful HotHardware reader, but ransomware attacks are rarely random. More commonly, it's an operator within a group who targets a specific organization or network looking for a hefty payout. One such group is the organization AvosLocker, who uses a tool by the same name to encrypt...
Read more...
In the past, we have seen incidents of text messages being rerouted to steal two-factor authentication codes to breach peoples’ accounts. Now, criminal hackers are being more direct in potentially using SIM swap attacks by getting a carrier—in this case, T-Mobile—to switch a customer’s number to an attacker-controlled...
Read more...
Do you let your browser store logins for websites like Twitter, Facebook, or HotHardware? Well, you probably shouldn't. Not only does it let anyone who gets on your PC access your personal information, but it also opens you up to easy attacks from "info-stealer" malware.
South Korean cyber-security firm Ahnlab just...
Read more...
LastPass is telling its users that there is no evidence to suggest their passwords have been compromised, after previously sending out emails to some users stating their master passwords have been compromised. So what exactly is going on? According to LastPass, the email warnings were "likely triggered in...
Read more...
Nobody wants to rack up bad karma, which should be reason alone not to pilfer movies from the internet via BitTorrent or whatever other means. But even disregarding the moral aspect or pirating movies and games, there's another reason not to engage in such behavior—you could end up with a malware infection. Some...
Read more...
If you're reading this, you probably don't need to be told that a "bug bounty" is a cash prize paid to security researchers that find a software exploit. Non-USians might need to be told that "DHS" refers to the United States Department of Homeland Security. "Hack DHS" is the bug bounty program run by the agency, and...
Read more...
You might already use DuckDuckGo as your go-to search engine rather than Google or Bing (or whatever else—AskJeeves, perhaps?). If you're into DuckDuckGo, then you will be ecstatic to learn that it is expanding from a privacy oriented search engine into a full-blown browser on the desktop, just as it has done on...
Read more...
With data breaches and malware on the rise, millions are turning on two-factor authentication (2FA) to try and protect themselves from an attack. One of the most popular apps to use with 2FA, Google Authenticator, has just hit a very big milestone because of it.
People have been bombarded with headlines about...
Read more...
In the spy thriller series Mission Impossible, Ethan Hunt’s directives from his superiors always self-destruct after being viewed. Information security isn’t just for spies, though. Many people face an uphill battle maintaining digital security, but the toughest challenge may be physical attack. You can only do so...
Read more...
If you're a technology enthusiast, you've probably heard of "one-click" malware. This is pretty scary stuff in its own right: one click of a carefully-crafted link in an e-mail or other text message, and you're infected. One-click malware has been around a long time, but there's something even worse these days. It's...
Read more...
One app on the Google Play store has sent users’ contacts to a Russian server on the sly. Then, it signed them up for expensive subscriptions. That one app has already been downloaded half a million times. If you’re among those 500,000 users who downloaded the app, you’d best delete it now. The app is called Color...
Read more...
Are you tired of hearing about Log4shell yet? Well settle in, because a top-3-worst-security-exploit-ever doesn't vanish overnight. Microsoft updated its article about the flaw (which we mentioned on Wednesday) once again, this time with some notes about protecting "non-Microsoft-hosted Minecraft servers."
Indeed...
Read more...
Even if you're from the U.S., you may not have heard of CISA. The Cybersecurity and Infrastructure Security Agency is part of the Department of Homeland Security, and it primarily handles technological threats to the nation. Well, CISA is still in the process of an all-hands red alert thanks to the Log4shell security...
Read more...
Companies in recent years have put added emphasis on reducing their carbon footprints, taking a more responsible approach to environmental challenges that are exacerbated by heightened consumerism. From manufacturing to disposing of electronics, energy consumption and e-waste are growing issues. They're also somewhat...
Read more...
If you employ Google's Chrome browser on your desktop, be aware there's an update available that patches up a handful of security flaws, including a zero-day vulnerability that is being actively exploited in the wild. As such, it's a tremendously good idea to manually update Chrome rather than waiting for an automatic...
Read more...
You may have heard about a recent prank making the rounds in Minecraft. By sending a chat message starting with "${jndi:ldap://" users could make their friends' Minecraft client open a browser window and go to a specific website. So naturally, pranksters were sending their friends to all kinds of shocking and...
Read more...