Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Yet another leak of stolen data has made its way to Breach Forums, a popular site for bad actors who traffic in this kind of data theft. The data originates from the breach of National Public Data, which is a service that gathers information from separate sources to form profiles on individuals located in several... Read more...
Kioxia will be debuting its latest Solid State Drive prototype at the Future of Memory and Storage conference taking place this week in Santa Clara, California. These broadband SSDs are designed to make use of an optical interface, instead of the legacy copper wire data interfaces currently found on SSDs. The SSDs are... Read more...
IT infrastructure and security systems built in the cloud are great until one of them shuts down your company. Cybersecurity firm CrowdStrike's marketing material says an average cybercriminal can exfiltrate data within 62 minutes of breaking in. However, it only took the company's cybersecurity suite about three... Read more...
Tenstorrent's name might not have quite the same cache that NVIDIA's does when it comes to AI acceleration yet, but the company's unique approach has a lot of benefits. Between a royalty-free RISC-V processor ISA and highly scalable AI accelerator designs, the company promises it can lower the total cost of ownership... Read more...
The artificial intelligence (AI) arms race is reaching a fever pitch, bolstered by AMD signing a definitive agreement to acquire Silo AI, Europe's biggest private AI lab, in an all-cash deal valued at around $665 million. That's not chump change and we could see more big-dollar investments like this as companies look to add to their AI arsenal, Read more...
It appears that AMD is now the latest victim of cybercrime and a data breach, as company data is being offered for sale on a message board frequented by criminal hackers. AMD acknowledged the situation in a statement, noting that, "we are aware of a cybercriminal organization claiming to be in possession of stolen AMD... Read more...
Market research firm Liftr Insights is claiming that it has spotted Amazon Web Services (AWS) running an instance with a staggering 896 cores, surpassing the company’s previous best of 384 cores. This current offering blows away anything else available from other cloud providers, with the closest competitor being... Read more...
Intel Xeon 6 Series Processors Intel is launching the first wave of next-generation Xeon 6 6700E-series processors today, based on Sierra Forest, featuring up to 144 E-cores per socket. Many More Cores Per Socket Power Efficiency Improvements Big Performance Gains Over 5th Gen New, Updated IO Tile Increased Bandwidth... Read more...
AMD disclosed a plethora of details during the Computex 2024 opening keynote regarding upcoming desktop and mobile processors in the Ryzen 9000 and Ryzen AI 300 families, respectively, along with a new dual-slot Radeon Pro W7900WS to facilitate multi-GPU configurations in professional workstations. In addition to... Read more...
It's hard to remember now, but the original AMD Ryzen processors topped out at "just" 8 cores. The Ryzen 3000 family came along in 2019 with the Ryzen 9 branding and the first sixteen-core desktop CPUs. Even in the enterprise market, 16 CPU cores can be overkill. However, you can't just go buying consumer PC hardware... Read more...
Are you looking to get some laundry done on the cheap or, even better yet, free? It turns out a security flaw in a popular internet-connected laundry machine vendor could allow anyone to avoid paying the fee for washing or drying clothes. This vulnerability was reported to the vendor months ago and remains unfixed... Read more...
AirTags and other property tracking tools are remarkably useful for keeping tabs on your stuff wherever it goes. However, on the flip side, hidden trackers are also a concern, with criminals learning to use Apple AirTags to mark vehicles that could be tracked and stolen later. Thankfully, both Apple and Google are... Read more...
It has been a little while since our last major data breach, with the latest being back on April Fools' with AT&T having the information of 73 million accounts appear on the dark web. However, hackers never rest so it was simply a matter of time before another breach would happen, this time with Dell. A threat actor... Read more...
Artificial intelligence has been used for some rather interesting applications, such as helping people deal with losing a loved one. While this is a unique use of the technology, there is so much more that AI can be used to improve our daily lives. This includes cybersecurity, which Google is now capitalizing on by... Read more...
Earlier this month, Microsoft discovered a vulnerability pattern in Android applications that could enable overwriting files and allow remote code execution. This issue that could be leveraged by attackers has also been seen in the wild with several applications, but organizations have seemingly been quick to rectify... Read more...
While some might say passwords are on the way out, especially with the advent of passkeys that are regarded as a better solution. However, the extinction of the password isn’t a reality yet. Passwords are still around and they're sometimes terribly not secure, especially if you use one of the top 200 worst passwords for any of your accounts. Read more...
The Google Play Store is the primary app repository for most Android users, and that makes it a tantalizing target for internet ne'er-do-wells. Google says it takes Play Store security seriously—so seriously, in fact, that it has whipped up a nifty little acronym to describe its approach. Google says that it leveraged... Read more...
In the past few years, the ransomware market has heated up, leading to more payouts for threat actors and more attacks overall. However, in late 2023, with the seizure of BlackCat ALPHV by law enforcement, among other factors, the business side of ransomware-as-a-service (RaaS) has been put on ice, at least somewhat... Read more...
If you are a threat actor and want to mine cryptocurrency or steal some juicy information, a gamer’s PC is a good target for that sort of thing, given the hardware and software they use. Even better yet is the PC of a game cheater because they are used to downloading sketchy software in the first place, so the barrier... Read more...
End-of-life hardware can be quite the problem at times, even crashing back into Earth’s atmosphere at supersonic speeds for that matter. Of course, we wouldn’t expect such travesties happening with the hardware you keep in your basement, or that NAS you tucked away your closet. However, older tech gear can have... Read more...
I guess the Notepad built into Windows is fine, but it could be better. It could have more features, cleanliness, and could simply just be iterated on as an improvement. Thankfully, there is Notepad++, a free and open-source Notepad replacement and code editor, which has become incredibly popular. With this... Read more...
Over the past few days, the security world has been abuzz with the discovery of a backdoor snuck into a compression utility called xz-utils. While this backdoor was effectively a near miss, getting caught before it became pervasive, it goes to show that with a bit of social engineering and laying low for a while, you... Read more...
1 2 3 4 5 Next