Zyxel Armor G5 AX6000

Zyxel Armor G5 AX6000 (NBG7815) Wi-Fi Router Review: 802.11AX, 10/2.5Gbps Ethernet, Forced Cloud Setup

Zyxel's $349 Armor G5 AX6000 (NBG7815) had me happily anticipating a smoother, faster, Wi-Fi and Ethernet experience for my local network, which is currently mired a couple of generations...
Kingston DC500M 7.68TB

Kingston DC500M Data Center SATA SSD Review: Up to 7.68TB of Reliable, Balanced Performance

Kingston's DC500M Data Center SATA SSD is exactly what I've come to expect from the company over the years--a good, stable performer with top-shelf, reliable components. For its intended...
artificial and human had reaching toward each other

Artificial Intelligence: The Hackers’ New Weapon

Malware is getting smarter---literally. Threat actors are using artificial intelligence to create cyberthreats capable of learning and acting as autonomous agents that can change their tactics as required to...
Signal Messenger Logo

Signal Messenger: Simple Security, Guaranteed Privacy, Great Functionality

In our hyper-connected, always-on world, privacy is in everyone’s thoughts. Instant messaging is the dominant tool for remote conversations. How can we use instant messaging and maintain our privacy?...
Asustor AS7110T

Asustor Lockerstor 10 Pro (AS7110T) NAS: 10 Bays of Storage Goodness

ASUSTOR has been making a name for itself over the last few years on all NAS fronts: consumer, prosumer, and corporate. SMB boxes like the $2400, AS7110 reveal why....
Yottamaster FS5U3 5-bay DAS

Yottamaster FS5U3 DAS review: 5 bays of Super Sturdy USB RAID storage

Yottamaster's five-bay (3.5-inch), FS5U3 direct attached storage box is nothing if not handsome. Actually, I should say handsome and solid--the nearly all-metal chassis and shell are built like a...
shielding your computer from malware during COVID-19

Shielding Your Computer From Malware During the COVID-19 Pandemic

Hackers are the bad eggs in the cyber world that try to make use of any opportunity to steal information or money. Characteristically, they latch onto vulnerabilities and security...
Top Microsoft Office 365 Backup Solutions

Top 3 Microsoft Office 365 Backup Solutions

Mention data safety, and backup will instantly spring to mind. What is not immediately available, even to seasoned IT professionals, is information about what makes a good backup solution....
Security Alert over program code

What is Penetration Testing?

How can you get an objective measurement of the effectiveness of your cyber defenses? Are the measures you’ve put in place as impenetrable as you hope? Penetration testing gives...
Internet of Things

The IoT – The I stands for Insecure

They're cheap, useful, and multiplying almost faster than can be counted. Internet of Things devices come in all shapes and sizes, but most of them share one characteristic. They're...
Orico Storage Backuper

Orico Storage Backuper Review

Orico is well-known for making great external storage products--and the newest venture, going by the name of "Storage Backuper," is an exciting one. Storage Backuper is an external backup...
A hacker with a smartphone on the roof of a tall building

What RF Attacks Are and How to Defend Against Them

Firewall and rules are in place, intrusion detection systems are running, and all industry best practices are being followed. Great, but what about Radio Frequency attacks? They nimbly sidestep...

Subscribe to stay updated with the latest news on data storage, network security, and surveillance.