Computers and Peripherals
Computers and Peripherals | News, how-tos, features, reviews, and videos
How the transition to Everything as a Service upended cybersecurity software models
With regard to the evolving stratification of security services, it is worth spending some time considering how reoccurring software-based service models have fundamentally upended network and cyber security businesses across the...
Now you, too, can disable Intel ME 'backdoor' thanks to the NSA
Researchers discovered an undocumented configuration setting that can used to disable the Intel ME master controller that has been likened to a backdoor.
video
Mingis on Tech: Is the new iPad Pro enterprise-ready?
Apple's top-end tablet hardware was already workplace worthy, but iOS still required some workarounds for things to go smoothly. iOS 11 may change that when it arrives later this year.
6 reasons chip hacks will become more popular
Code embedded in hardware has vulnerabilities and it's harder to patch. That will make it a target for hackers.
Netgear NightHawk R7000 routers now collect user data
A firmware update to Netgear NighHawk R7000 routers allows the routers to collect IP, MAC address and info about connected devices. Here's how to disable it.
27 arrested for black box ATM attacks across Europe
Europol said in a statement last week that 27 people have been arrested for their connection to a string of successful black box attacks against ATMs across Europe. Since 2016, these attacks have resulted in more than €45 million in...
China pays for Windows XP addiction as 'WannaCry' hits
The WannaCry ransomware has wormed its way into tens of thousands of Windows PCs in China, where Windows XP remains relatively popular.
video
Four devices to get a better night's sleep
Network World Cool Tools columnist Keith Shaw shows off four gadgets (two sleep trackers, two noise machines) that can help you get more or better sleep at night.
Security entrepreneur’s tiny hack-proof password computer
PasswordsFAST personal password manager product review
Drunken man arrested for assaulting 300-lb. K5 security robot
The drunken man allegedly wanted to "test" the 5-foot-tall, 300-pound, egg-shaped K5 security robot.
Night at the information security museum
Museum physical security incidents provide an excellent learning mechanism for information security teams. With that, I’d like to look at three major museum incidents and provide a lesson learned from each for information security...
video
6 portable keyboards for tech workers on the go
CIO.com writer, Sarah White looks at 6 portable keyboards for IT pros that want a light easy-to-use keyboard that can go anywhere.
Experts contend Microsoft canceled Feb. updates to patch NSA exploits
Microsoft may have delayed its February security update slate to finish patching critical flaws in Windows that a hacker gang tried to sell.
Microsoft kills off security bulletins after several stays
Microsoft this week retired the security bulletins that for decades have described each month's slate of vulnerabilities and patches for customers.
Researchers developing autonomous robot surveillance
Using a grant from the U.S. Navy, researchers plan to develop autonomous robot surveillance, many eyes with one mind, to "protect you from danger."
video
Fitbit Alta HR: Looks aren't everything
With the market of fitness wearables growing fast, CIO.com contributor Jim Martin looks at the Fitbit Alta HR to see where this device fits.
video
Mingis on Tech: Energy microgrids, what's up with Apple TV -- and drones!
Here's one way to re-build the electric grid: Do it piecemeal -- with microgrids. With that squared away, we turn to figuring out what Apple is up to with Apple TV and get the details on DJI's new $1,000 Mavic drone.
UEFI flaws can be exploited to install highly persistent ransomware
A team of researchers from security vendor Cylance demonstrated a proof-of-concept ransomware program that ran inside a motherboard's Unified Extensible Firmware Interface (UEFI).
Here's how Microsoft is helping companies build IoT hardware
One of the biggest challenges with building connected hardware is getting from proof-of-concept (PoC) prototypes to a devices that are ready for a large-scale production rollout. Microsoft is aiming to help with that issue through a...
video
CW@50: 50 years of storage
By the time Computerworld was born in 1967, IBM was well established as the kingpin for computer storage. But over the next five decades, that changed dramatically as new companies rose and fell, storage capacities soared and costs...