Please turn on your JavaScript for this page to function normally.
Lenovo expands portfolio of IT infrastructure solutions for enhanced data management

Lenovo Data Center Group (DCG) expands its portfolio of IT infrastructure solutions. As companies implement Internet of Things (IoT) solutions and 5G technologies, an increase …

Pivot3 provides its HCI software platform to Lenovo DCG to deliver integrated edge computing solutions

Pivot3, a leading provider of intelligent infrastructure solutions, announced that it is providing its hyperconverged infrastructure (HCI) software platform to Lenovo …

foiling firmware attacks
Microsoft debuts hardware-rooted security for foiling firmware attacks

Microsoft partnered with mainstream chip and computer makers to deliver hardware protection of firmware right out of the box: the so-called Secured-core PCs are aimed at …

router
Researchers uncover 125 vulnerabilities across 13 routers and NAS devices

In a cybersecurity study of network attached storage (NAS) systems and routers, Independent Security Evaluators (ISE) found 125 vulnerabilities in 13 IoT devices, reaffirming …

Bluetooth
Critical Bluetooth flaw opens millions of devices to eavesdropping attacks

A newly disclosed vulnerability (CVE-2019-9506) in the Bluetooth Core Specification can be exploited by attackers to intercept and manipulate Bluetooth communications/traffic …

server
Flaw in Iomega, LenovoEMC NAS devices exposes millions of files on the Internet

A vulnerability in legacy Iomega and LenovoEMC network-attached storage (NAS) devices has led to many terabytes of potentially sensitive data being accessible to anyone via …

Lenovo and Pivot3 optimize smart city security

Lenovo and Pivot3 announced a strategic partnership to develop, market and sell a new set of edge computing solutions optimized for mission-critical smart city security. The …

Lenovo and Cloudistics develop ThinkAgile CP series composable cloud platform

Lenovo is further expanding its ThinkAgile portfolio to provide a solution for customers who desire the agility of the public cloud and the security of a private cloud. To …

access
Facebook gave user data access to Chinese mobile device makers, too

On Sunday, The New York Times revealed that Facebook has been providing mobile phone and tablet vendors access to user (and users’ friends’) data even though the …

fingerprint
Lenovo Fingerprint Manager Pro is full of fail

Lenovo Fingerprint Manager Pro, a piece of software that allows users to log into their PCs or authenticate to configured websites using fingerprint recognition, has been …

Intel processor
Intel chips riddled with deadly flaws

As we’re waiting for security researchers to detail the Intel Management Engine vulnerability that can allow attackers to run undetectable, unsigned code on machines …

Facepalm
Sites using session replay scripts leak sensitive user data

When we enter sensitive information – our names, passwords, payment card information, medical information, what have you – into websites, we do it with the …

Don't miss

Cybersecurity news