Lenovo finds itself at the center of a security storm today over concerns related to the so-called Superfish adware that was included on some of the company’s PCs. The concern is that Superfish bypasses Secure Sockets Layer/Transport Layer Security best practices and could potentially enable man-in-the-middle attacks. Lenovo denies consumers were ever at risk and […]
Juniper officials have unveiled the new ACX500 and ACX5000 routers, which offer enhanced capabilities including improved accuracy in detecting signal hand-offs, improved routing of small cell signals and embedded virtualized functions. New features in the Junos Connectivity Services Director and Cross Provisioning Platform software enable the automated provisioning and unified management of Carrier Ethernet services […]
When the Apple Watch hits the consumer market in April, it will not have capabilities to monitor blood pressure, heart rate, stress factors and other health issues that the company originally specified when the company announced the device in September, 2014. According to The Wall Street Journal Some of the omitted health features “didn’t work […]
President Barack Obama’s visit to California Feb. 13 at the White House Summit on Cyber-Security and Consumer Protection was a high-visibility indicator that the federal government has made cyber-security a national security and public safety issue. The president signed and enacted an executive order for this back-channel information-sharing cooperation to actually get moving in real […]
Hewlett-Packard is releasing another set of preconfigured cloud infrastructure packages aimed at particular workloads to accelerate customer adoption of the vendor’s Helion private cloud offering. The seven new pre-priced configurations, announced Feb. 12, touch on an array of lighter enterprise workloads and more business-class applications, ranging from software development to data mining and analytics. The […]
Dell is extending the ProSupport Plus service that it has in place for data center systems like servers and networking gear to its business PCs and tablets. What’s more, the company is including the ability for the technology to monitor the health of the systems and proactively report when problems occur, in an effort to […]
Hewlett-Packard has conducted a study on Internet-enabled home security systems that found that the security systems themselves are insecure. Daniel Miessler, practice principal at HP Fortify stated that the major finding was that 10 out of 10 systems could be brute-forced to extract usernames and passwords via the Internet. A brute-force attack is one in […]
Health insurance provider Anthem disclosed on Feb. 4 that it was the victim of a data breach that exposed 80 million customer and employee records. Multiple Anthem brands—including Anthem Blue Cross, Anthem Blue Cross and Blue Shield, Blue Cross and Blue Shield of Georgia, Empire Blue Cross and Blue Shield, Amerigroup and Caremore were impacted […]
Microsoft’s “cloud-first” product strategy is reshaping SharePoint, the tech giant’s collaboration platform for businesses. Julia White, general manager of Office Product Management for Microsoft, explained that despite this cloud-first approach, customers of the on-premises server version of the software needn’t worry that they’re getting left behind. In a lengthy Office Blogs post detailing SharePoint’s new […]
Samsung has unveiled a special media invitation to its “Samsung Galaxy Unpacked 2015” event, which will also be live-streamed, to show off the next Galaxy S smartphone that will become the company’s next flagship handset. No details are included, just a stark black-and-white image that includes the text, “What’s Next” and a straight, shiny line […]