Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

When you delete something, you would naturally expect it to stay deleted. With the "acropalypse" bug, all bets are off. Security researchers discovered last week that Google's Pixel phones would retain data from cropped screenshots, allowing the cropped sections to be recovered. Now, it sounds like there's an almost... Read more...
NVIDIA CEO Jensen Huang introduced how the company is bringing AI to virtually every industry during his 2023 GTC keynote. From semiconductors to software libraries, AI training to deployment, and systems to cloud services, NVIDIA says it is bringing AI to the world's fingertips. The 2023 GTC Developer Conference, now in its 14th year, Read more...
Famed automaker Ferrari announced yesterday that the company suffered a data breach involving personal information of its clients, without any impact on its operations. A hacker or hackers were recently able to gain access to the Maranello based company's IT systems, demanding a ransom for the client info... Read more...
Leaked specifications of two upcoming AMD EPYC Genoa-X CPUs reveal that these chips will feature over 1GB of L3 cache with the integration of 3D V-Cache technology. Known as 100-000000892-04 and 100-000000892-06 respectively, both CPUs are fitted with a 64MB slab of 3D V-Cache on top of all 12 (yes twelve) of its Zen... Read more...
AMD announced its EPYC Embedded 9004 Series of processors for embedded systems this morning at Embedded World 2023. These 4th Gen EPYC Embedded processors are based on the same 5nm Zen 4 architecture as the mainstream “Genoa” platform, which affords excellent performance and scalability. AMD is targeting networking... Read more...
The world's first commercial flash-based solid state drive checked in at a meager 20MB when it shipped over three decades ago. A lot has changed since then and these days 1TB and 2TB SSDs are commonplace, while 4TB and even 8TB SSDs lay on the fringe of high-end consumer systems. Bigger capacities are available in the... Read more...
Throughout the end of last year and the beginning of this year, Intel finally released its full line of data center-focused Arctic Sound and Ponte Vecchio GPUs, as well as its Sapphire Rapids CPUs. These chips have been a long time coming, but they offer solid performance for high performance compute operations, as... Read more...
Amazon-owned Ring is one of the largest providers of smart home cameras and security products, but any users who were trying to get by with the free service tier might be looking to jump ship soon. According to notices sent out by Ring, the company's cameras and security system will lose several key features in the... Read more...
Microsoft went wild with Windows 10 upgrades, offering everyone and anyone a free path to get on Microsoft's latest OS. There was speculation that Microsoft would never release another distinct version of Windows, but after five years, we got Windows 11. This time, Microsoft isn't letting just any PC upgrade to the... Read more...
Dell Precision 7865: As Configured - $15,840 The Dell Precision 7865 chews through workstation-class workloads with a 64-core AMD Threadripper Pro CPU and NVIDIA RTX A6000 GPU, while remaining cool and quiet. 64-Core AMD Threadripper CPU Performance 8-Channel DDR4 Memory Mostly Toolless Design For Servicing... Read more...
Once upon a time, there was a clear division between typical desktop computers and servers. With Nehalem in 2008, Intel really put the pedal to the metal in the "big iron" enterprise and high-performance computing space, and it soon brought some of those server technologies to the desktop in the form of its "High-End... Read more...
Mortal Kombat has a reputation for being brutal, but rather than exacting excessive violence on video game characters, unknown threat actors are brazenly brutalizing their victims’ finances in a Mortal Kombat-themed ransomware campaign. Aside from ransomware, this campaign also makes use of the Laplas Clipper malware... Read more...
Scammers are real pieces of...work (substitute any word you like) as they rarely display any scruples—they prey on the elderly, think nothing of wiping out someone's hard-earned life savings, and are opportunistic predators. That latter part is especially relevant right now with Valentine's Day upon us. According to... Read more...
Pepsi Bottling Ventures (PBV) has suffered a major data breach, with hackers making off with a trove of sensitive information. The company has begun notifying affected individuals of this incident, but the details remain sparse. According to a sample of the security notice issued by PBV, unknown threat actors managed... Read more...
Last year saw a rise in threat actors abusing Microsoft Office macros to infect their victims’ systems with malware, prompting Microsoft to block macros embedded in documents downloaded from the internet. In response, threat actors have had to pivot to alternative malware distribution and infection methods, including... Read more...
We often report on phishing campaigns involving fraudulent customer support agents who trick victims into giving up sensitive information or installing malware on their systems. However, sometimes threat actors flip this script, instead posing as customers in need of help in order to prey on customer support agents... Read more...
The password manager KeePass is currently the subject of a debate concerning whether or not a particular design decision should be considered a security vulnerability. At the center of this debate is KeePass’ support of triggers, one of which exports users’ password databases. Threat actors could potentially leverage... Read more...
Earlier this month, a Swiss hacker who goes by the name maia arson crimew exfiltrated a copy the US government’s No Fly List from an insecure server. This list, which names individuals who are forbidden from flying anywhere within US borders, is a subset of the Terrorist Screening Database and is kept hidden from the... Read more...
Last November, two weeks after the Biden administration held the second International Counter Ransomware Summit, the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Health and Human Services (HHS) published a joint cybersecurity advisory warning... Read more...
Yesterday, the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) published a joint cybersecurity advisory warning network defenders about phishing attacks that leverage remote monitoring and management... Read more...
TA444 is an advanced persistent threat (APT) group believed to be associated with the North Korean government. However, rather than receiving financial backing from its government, the group seems to bring in revenue for the government. Unlike most state-backed APTs, such as China’s Aoqin Dragon or Iran’s Charming... Read more...
Over the past week, Gmail users have been reporting abuse of the Google Ads platform. However, rather than conducting ad fraud or placing ads that distribute malware, the actors behind this recent activity are leveraging the Google Ads invitation system to direct traffic to various to risky websites. These sites are... Read more...
First ... Prev 3 4 5 6 7 Next