Security Alert over program code

What is Penetration Testing?

How can you get an objective measurement of the effectiveness of your cyber defenses? Are the measures you’ve put in place as impenetrable as you hope? Penetration testing gives...
Internet of Things

The IoT – The I stands for Insecure

They're cheap, useful, and multiplying almost faster than can be counted. Internet of Things devices come in all shapes and sizes, but most of them share one characteristic. They're...
Orico Storage Backuper

Orico Storage Backuper Review

Orico is well-known for making great external storage products--and the newest venture, going by the name of "Storage Backuper," is an exciting one. Storage Backuper is an external backup...
A hacker with a smartphone on the roof of a tall building

What RF Attacks Are and How to Defend Against Them

Firewall and rules are in place, intrusion detection systems are running, and all industry best practices are being followed. Great, but what about Radio Frequency attacks? They nimbly sidestep...
Seagate IronWolf Pro 125 SSD

Seagate IronWolf Pro 125 SSD Review: Hard-working, Over-provisioned to the Max

When you opt for a more expensive SSD such as Seagate's new IronWolf Pro 125, you're largely paying for peace of mind. That is, the premium price reflects a...
Gmail in safari browser

What is Phishing? The Minefield in your Mailbox

They’ve been used against us for over two decades, so phishing attacks are hardly new. They have evolved, however. No longer limited to email, they can also be delivered...
32 Cyber Security Terms Everyone Should Know

32 Cyber Security Terms Everyone Should Know

Cybersecurity, like most technical subjects, comes with its own set of jargon. At first, it can seem impenetrable. Here’s an easy introduction to 32 terms you should be familiar...
Seagate IronWolf Pro 18TB

Seagate IronWolf Pro 18TB hard drive: Fast, Tons of Capacity, No Shingling

Seagate's latest entry into the spin-platters-because-they-make-storing-data-cheaper market is the rather excellent and exceedingly capacious 18TB IronWolf Pro. I once paid $700 for a 4GB drive. $550 for 18TB? Amazing. Design...
TrueNAS R-series models

iXsystems Launches R-Series Systems and Scale-out HCI Software

iXsystems made two big announcements today with the launch of the new TrueNAS R-Series storage systems and the TrueNAS SCALE Open Source Hyper-Converged Infrastructure (HCI) software. Meet the TrueNAS R-Series The...

SSD vs. HDD: What’s the Difference?

If I were to be cavalier about the question posed and answered by this article, I'd simply tell you that Solid-State Drives (SSDs) are very fast, and Hard Disk...
What is browser hijacking?

What are Browser Hijackers and How Do You Remove Them?

Browser hijackers are a type of malware designed to attack and compromise web browsers. They change your browser's settings without your permission or knowledge. Why attack browsers? Because everyone...
FreeNAS vs UNRAID

FreeNAS vs. UnRAID: What are the Differences?

To the outside world, FreeNAS (TrueNAS) and UnRAID appear far more alike than different. In effect, they are. Both are operating systems that allow you to leverage your own...
Statue of Queen Victoria

What is Punched Paper Tape, and How to Read It

To most people who can even remember what punched paper tape is, it'll seem like a relic of yesteryear. But as we'll see, that's not strictly the case. What...
QNAP QGD-1600P Switch

White Paper: QNAP QGD-1600P Managed Network Switch

Internet of Things (IoT), smart connected solutions, and installations have seen tremendous growth in recent years, and the business impact that they carry is not something that can be...

Subscribe to stay updated with the latest news on data storage, network security, and surveillance.