More stories

  • in

    AWS announces EC2 M6i using Ice Lake Xeon Scalable processors

    Image: Intel
    Amazon Web Services has announced the availability of M6i instances that make use of Intel’s Ice Lake Xeon Scalable processors, and its Total Memory Encryption functionality.The performance bump over M5 instances is said to be an up-to-15% improvement for compute, and twice the networking speed of M5, Amazon said. AWS has created a new instance size, m6i.32xlarge, that consists of 128 vCPUs and 512 GiB of memory, which is a 33% increase on the largest M5 instance, and has 20% higher memory bandwidth per vCPU thanks to Elastic Fabric Adapter. Otherwise, M6i instances are available with 2, 4, 8, 16, 32, 48, 64, or 96 vCPUs. m6i.32xlarge is touted as having 50Gbps of networking speed and 40Gbps of bandwidth to the Amazon Elastic Block Store, and 10Gbps of bandwidth in 2, 4, 8, and 16 vCPU instances. M6 instances are available today in US East, US West, Frankfurt, Ireland, and Singapore regions as on-demand purchases, or with savings plans, reserved instances, spot instances, dedicated instances or dedicated hosts. Last month, AWS warned users to get off EC2-Classic instances ahead of its shutdown. On October 30, AWS will disable EC2-Classic in Regions for AWS accounts that have no active EC2-Classic resources in the region, and the company will not sell one-year and three-year reserved instances. AWS expects migrations to be complete by August 2022. Related Coverage More

  • in

    Brazilian National Treasury hit with ransomware attack

    The Brazilian government has released a note stating the National Treasury has been hit with a ransomware attack on Friday (13). According to a statement from the Ministry of Economy, initial measures to contain the impact of the cyberattack were immediately taken. The first assessments so far have found there was no damage to the structuring systems of the National Treasury, such as the platforms relating to public debt administration.The effects of the ransomware attack are being analyzed by security specialists from the National Treasury and the Digital Government Secretariat (DGS). The Federal Police has also been notified. The Ministry noted new information on the incident “will be disclosed in a timely manner and with due transparency”.A further statement released jointly with the Brazilian Stock Exchange today (16) noted that the attack did not affect “in any way” the operations of Tesouro Direto – a program that enables the purchase of Brazilian government bonds by individuals.The incident at the National Treasury follows a major cyberattack that emerged in November 2020, against the Brazilian Superior Electoral Court. The attack brought the Court’s systems to a standstill for over two weeks. At the time, the event was considered to the most comprehensive attack ever orchestrated against a Brazilian public sector institution, in terms of its complexity and the extension of the damage caused.In July, the Brazilian government announced the creation of a cyberattack response network aimed at promoting faster response to cyber threats and vulnerabilities through coordination between federal government bodies.

    The DGS, which operates under the Special Secretariat for Management and Digital Government of the Ministry of Economy, will have a strategic role in the formation of the network. The DGS is the central body of SISP, a system utilized for planning, coordinating, organizing, operating, controlling and supervising the federal government’s information technology resources across more than 200 bodies. In the private sector, major ransomware attacks that emerged in 2021 in Brazil involved large companies such as healthcare firm Fleury and aerospace conglomerate Embraer. More

  • in

    Colonial Pipeline sends breach letters to more than 5,000 after ransomware group accessed SSNs, more

    Colonial Pipeline is sending out breach notification letters to 5,810 current and former employees whose personal information was accessed by the DarkSide ransomware group during an attack in May. The company admitted in an August 13 letter that on May 6, the ransomware group “acquired certain records” stored in their systems. 

    ZDNet Recommends

    “The affected records contained certain personal information, such as name, contact information, date of birth, government-issued ID (such as Social Security, military ID, tax ID and driver’s license numbers) and health-related information (including health insurance information). Not all of this information was affected for each impacted individual,” the letter said. Bloomberg reported in May that before locking down the pipeline’s business systems, the group stole almost 100 GBs of data. Colonial Pipeline said it was offering victims of the hack two free years of “identity restoration” and credit monitoring services from Experian. They urged those affected to check their credit reports for any unauthorized activity. The letter was first reported by Bleeping Computer and a company official confirmed to CNN Business that personal information was lost during the ransomware attack. The attack on Colonial Pipeline, which left significant parts of the East Coast without gas for several days, kicked off a swift change in the government’s response to ransomware incidents. Since the attack, multiple new regulations have been released for critical industries in general as well as the oil and gas industry specifically. 

    Colonial ended up paying a ransom of $4.4 million to the DarkSide group due to the urgency of the gas crisis, but US law enforcement managed to get a portion of it back. Due to increased law enforcement interest globally, the people behind DarkSide shuttered their operation and some members reformed under a new name: BlackMatter. The Record spoke with the operators behind BlackMatter, who specifically cited the Colonial Pipeline attack as “a key factor for the closure of REvil and DarkSide,” adding that the group has now “forbidden that type of targeting and we see no sense in attacking them.” More

  • in

    Identity platform Clear Secure sees revenue fall in Q2

    Clear Secure, the tech company that operates the Clear identity platform used at airports and other venues, published its second quarter financial results on Monday, its first quarterly report as a publicly-traded company. Revenue declined year-over-year, though total bookings grew 102 percent year-over-year thanks to a strong rebound in traveling during the second quarter. Shares fell in after-hours trading.
    Clear Secure
    The company reported basic and diluted net loss per share of 3 cents. However, that does not reflect a full quarter of results since Clear Secure’s initial public offering occurred on June 30. Revenue for the quarter was $55.2 million, down 8 percent year-over-year. Analysts had been expecting a net loss of 31 cents per share on revenue of $54.21 million. “We entered the year bullish on travel and the recovery has been faster and stronger than we expected,” CEO Caryn Seidman-Becker  and CFO Kenneth Cornick, co-founders of the company, wrote in a shareholder letter. “Aligned with the convenience economy, travelers are craving CLEAR’s touchless, frictionless, predictable travel journey. We are gaining share in existing airports, opening new airports and launching new products.”The rebound in travel led to strong Total Bookings growth. However, the strength in Total Bookings was not reflected in revenues, since revenues lag behind Total Bookings — Clear Secure bills members upfront and recognizes that revenue over the life of a membership, usually 12 months. Meanwhile, Clear Secure’s non-aviation platform, particularly Health Pass, gained significant momentum in the quarter with new partners and existing and new members. 

    “In just over a year since its launch, Health Pass has scaled and become a trusted product. Our partners are looking for an easy, secure, and privacy-centric solution for testing and vaccination attestation,” Seidman-Becker  and CFO Kenneth Cornick wrote. “Health Pass gives consumers access to and control of their health data.”Clear Secure partnered with the state of Hawaii in the quarter to bring Health Pass to travelers to meet entry requirements without quarantine. Health Pass integrates with hundreds of providers and partners like Walmart, Atlantic Health, California and New York State. Clear Secure’s Total Cumulative Enrollments grew 26 percent year-over-year to 6.3 million, reaching 7 million on August 15. The growth was driven by both CLEAR Plus enrollments and platform enrollments. Incremental enrollments in the quarter were 760,000, more than double the first quarter of 2021. The company experienced overall strength in new member growth, though many of its markets remained below 2019 levels.Second quarter Total Cumulative Platform Uses grew 19 percent year-over-year to 65.5 million, driven by airport verifications as well as Health Passes uses. For Q3 2021, Clear Secure expects revenue of $65.5 million to 66 million. Analysts are expecting revenue of $65.32 million.

    Tech Earnings More

  • in

    Linux glibc security fix created a nastier Linux bug

    The GNU C Library (glibc) is essential to Linux. So, when something goes wrong with it, it’s a big deal. When a fix was made in early June for a relatively minor problem, CVE-2021-33574, which could result in application crashes, this was a good thing. Unfortunately, it turned out the fix introduced a new and nastier problem, CVE-2021-38604. It’s always something!

    The first problem wasn’t that bad. As Siddhesh Poyarekar, a Red Hat principal software engineer wrote, “In order to mount a minimal attack using this flaw, an attacker needs many pre-requisites to be able to even crash a program using this mq_notify bug.” Still, it needed patching and so it was fixed. Alas, the fix contained an even nastier bug.While checking the patch, Nikita Popov, a member of the CloudLinux TuxCare Team, found the problem. It turns out that it is possible to cause a situation where a segmentation fault could be triggered within the library. This can lead to any application using the library crashing. This, of course, would cause a Denial-of-Service (DoS) issue. This problem, unlike the earlier one, would be much easier to trigger. Whoops.Red Hat gives the problem in its Common Vulnerability Scoring System (CVSS) a score of 7.5, which is “high.” An attack using it would be easy to build and requires no privileges to be made. In short, it’s bad news. Popov himself thinks “every Linux application including interpreters of other languages (python, PHP) is linked with glibc. It’s the second important thing after the kernel itself, so the impact is quite high.”Popov found the problem while doing “his usual routine of porting CVE-2021-33574 fix to our supported distros.”  He found that null pointers could be passed in certain situations. Technically, the problem lay in the ‘mq_’ function family. These provide POSIX compliant message queue application programming interface (API) functionality. Typically these are used for inter-process communications (IPC) processes. Every Linux application including interpreters of other languages (Python, PHP) is linked with glibc library.

    Popov found “two situations where the Linux Kernel would use the message NOTIFY_REMOVED while passing copied thread attributes along the way in the data.attr field. Unfortunately, a host application is able to pass a NULL value there if it wants glibc to spawn a thread with default attributes. In this case, glibc would dereference a NULL pointer in pthread_attr_destroy, leading to a crash of the entire process.”The C programmers among you are already closing their eyes and shaking their heads ruefully. One of the common rules of C programming is to never, ever dereference a null pointer. The question isn’t “Will it crash the program?” It’s “How badly will it crash the program?”  The good news is both the vulnerability and code fix have been submitted to the glibc development team. It has already been incorporated into upstream glibc.In addition, a new test has been submitted to glibc’s automated test suite to pick up this situation and prevent it from happening in the future. The bottom line is sometimes changed in unrelated code paths can lead to behaviors changing elsewhere without the programmer realizing what’s going on. This test will catch this situation.The Linux distributors are still working out the best way to deploy the fix. In the meantime, if you want to be extra careful — and I think you should be — you should upgrade to the newest stable version of glibc 2.34 or higher. Related Stories: More

  • in

    T-Mobile says hackers accessed user data but won't confirm SSN breach of 100 million customers

    T-Mobile is looking into allegations that a hacker stole 106GB of data containing the social security numbers, names, addresses and driver’s license information for more than 100 million people.

    In a statement to ZDNet, T-Mobile said it is “aware of claims made in an underground forum and have been actively investigating their validity.” Teams at T-Mobile have been “working around the clock” to investigate the situation, a spokesperson told ZDNet, adding that they have hired digital forensic experts and contacted law enforcement. “We have determined that unauthorized access to some T-Mobile data occurred, however we have not yet determined that there is any personal customer data involved. We are confident that the entry point used to gain access has been closed, and we are continuing our deep technical review of the situation across our systems to identify the nature of any data that was illegally accessed,” the spokesperson said. “This investigation will take some time but we are working with the highest degree of urgency. Until we have completed this assessment we cannot confirm the reported number of records affected or the validity of statements made by others. We understand that customers will have questions and concerns, and resolving those is critically important to us.”A reporter at Motherboard spoke to the hacker, who said they had stolen it from T-Mobile servers and that the batch also included unique International Mobile Equipment Identity (IMEI) numbers. Motherboard confirmed that the data was from real T-Mobile customers. The hacker told Motherboard that T-Mobile has already kicked them out of the breached servers but noted that copies of the data had already been made. On an underground forum, the hacker is selling a sample of the data with 30 million social security numbers and driver licenses for 6 Bitcoin, according to Motherboard and Bleeping Computer. Alon Gal, co-founder of cybercrime intelligence firm Hudson Rock, also spoke to the hacker and wrote on Twitter that he was told about other motives for the attack.  

    “The breach was done to retaliate against the US for the kidnapping and torture of John Erin Binns (CIA Raven-1) in Germany by CIA and Turkish intelligence agents in 2019,” the hacker allegedly told Gal. “We did it to harm US infrastructure.”Binns filed a lawsuit against the FBI, CIA and Justice Department in November where he said he was being investigated for various cybercrimes, including participation in the Satori botnet conspiracy. He is a US citizen but lived in Izmir, Turkey and claimed he had been tortured and spied on for being an alleged member of the Islamic State militant group. He denied being a member of the group in his lawsuit.The unnamed hacker later spoke to Bleeping Computer to say that they gained access to T-Mobile’s systems through “production, staging, and development servers two weeks ago.” They also hacked into an Oracle database server that had customer data inside.To prove it was real, the attackers shared a screenshot of their SSH connection to a production server running Oracle with reporters from Bleeping Computer. They did not try to ransom T-Mobile because they already had buyers online, according to their interview with the news outlet.T-Mobile has been hacked multiple times over the last few years. In January they announced their fourth data breach in three years after incidents in August 2018, November 2019, and March 2020. More

  • in

    WP Engine review: Delivers exactly what it promises

    (image: WP Engine)
    If you’re looking for a web hosting provider, you have a tremendous number of choices. In my web hosting provider comparison guide — Best web hosting providers —  I looked at 15 providers that offer a wide range of plans.In this review, we’re going to dive into WP Engine’s offerings. Normally, to get a better feel for each individual provider, I set up the most basic account possible and performed a series of tests. But WP Engine is a more specialized host, primarily offering managed WordPress hosting.As such, WP Engine’s basic plan starts at $24 per month (when a year is prepaid), where most of the other hosting providers we’ve reviewed offer plans under $5 per month. Note that this isn’t because WP Engine is overpriced. Instead, it’s offering a more advanced level of service for sites that require more resources.As you transition from a site with a few pages to a site like mine with a lot of complexity but still relatively small, to huge sites like ZDNet, the cost of hosting goes up considerably. WP Engine targets small businesses up through enterprise needs, so its pricing reflects the resources those customers need to be able to use. For our review, I’ve chosen the Managed Hosting Plus Startup Plan. The Plus plan is $4 per month different from the basic plan, but it adds automatic plugin updates, tested plugins, auto-rollbacks, and a choice of which plugins are updated. To be clear, the automatic plugin updates feature is no longer much of a selling point, because WordPress now offers that as part of its basic install. But the auto-rollback feature (which when you need it, you really need it) is worth the extra few bucks a month. If you’re springing for managed hosting, you might as well have an “Ah, sh__!” button you can press when you need it. How pricing works

    This is normally the place in my hosting reviews where I begin my rant on the scammy bait-and-switch lock-in strategy hosting providers use to get and keep your business. Lower-end hosting services suck you in with offers of a couple of bucks a month. But to get the advertised price, you wind up paying for years of service up front, and then when that contract is up, the renewal fees are anywhere from double to ten times what you originally paid. There are business reasons for this, of course. First, it works. Most people don’t worry about what the renewal cost will be until they’re faced with a whopping bill to keep their site up or incur weeks or months of pain to port it somewhere else. But it’s also because running a hosting service is expensive, and the hosts have to make money somehow. But once you move up a tier, into small business managed hosting and above, most hosting providers make their money from the fees they charge. They don’t have to entice you with a low-ball offer. You know you need more memory, more CPU capacity, more storage, more bandwidth, and more support — and you’re willing to pay for it. So, they don’t need to bait-and-switch. After all, at $30 per month to $40 per month, you’re paying more in a month than many of the low-ball hosting providers make in a year from a given client. Types of plans offered WP Engine’s plans are like that. It has tiers that make sense. First, if you pay for a year up front, you save a bit over paying monthly. Usually, that’s the equivalent of about two months of free service. For every category of plan, it scales based on the number of sites you get with the plan, number of visits per month, amount of storage you use, and bandwidth. Then comes the four plan types the offer. The first is basic managed hosting. This gets you 24/7 support via chat, some themes, free automated migrations, daily backups, free SSL and SSH, and a staging site. All good, especially if you’re doing series work. I opted to test the Managed Hosting Plus plan, which is just a few bucks more. As I mentioned, it adds automatic updates (which is now provided by WordPress), and automatic rollbacks, which is very helpful. When I scoped out the plans, I realized I would never recommend the basic plan given the Plus plan is a few bucks more. So, I’m testing that. If you don’t get the WP Engine eCommerce plan, you’re not prevented from setting up an online store. It’s just that you have to do most of the heavy lifting, finding the software, etc. With the eCommerce plan, WP Engine installs WooCommerce (the top WordPress online store add-on, owned by the company that produces WordPress). It also provides an optimized store theme, some templates, and so on. In the next tier up, it adds store search functionality, which lets customers search for products. Basically, you’re paying a few bucks more for WP Engine to get it working for you. Finally, the company has a Secured Hosting plan. This doesn’t necessarily secure your site from malware. If you’re concerned about malware, you can reach out to WP Engine support, and they’ll help you determine if you’ve been attacked or not. No, what the Secured Hosting plan does is protect you from outside traffic attacks. It offers distributed denial of service attack protection and a security firewall for your traffic (which can help defend against malware flowing into your site). In 2009 (before I wrote for ZDNet), I was on the receiving end of a massive attack. My hosting provider did not have any defense and I wound up writing my own code. It would have been a huge relief to have the Secured Hosting plan when that happened. Installing WordPressWhen you first log into WP Engine’s dashboard, you’re greeted with a survey screen. Presumably, these questions are used for marketing purposes. Once you dig through those screens, you’re given the opportunity to set up other user accounts. These are dashboard users. Setting up your WordPress users will be done in WordPress. And, finally, you’re in the dashboard. Let’s add a new site: This step is actually very interesting and requires some unpacking. When you buy your plan, you’re given a certain number of sites you’re allowed. The plan I’m on allows one site. But…WP Engine has this concept of a “transferable site.” You can’t switch a site from non-transferable to transferable, so decide this upfront. A transferable site is one where you build the site, then you transfer it to a client who also has a WP Engine account. You’re allowed as many transferable sites as you want since the only way outside traffic can get in is via a password-protected portal. Next up comes a grid of four choices. You can start with a (mostly) blank site, get some handholding as you build your site, or transfer sites. I always like to go with as much control as I can, so I’m starting with a basic site. Then I clicked Next. I thought this was kind of interesting. First, you need to name your “environment.” Initially, you can use a subdomain, but you can later move it to a domain of your choosing. It’s this environment thing that’s interesting. In addition to the transferable sites, you can set up three “environment” sites: Development, staging, and testing. This means you can work on your site while your production site is live, and then switch environments. I like that… a lot. I’m going to go straight to production because I’m just running some basic tests. I’m also turning off automatic plugin updates because I like to be aware of when my plugins update. Then I clicked Add Site. At this point, the following Site list shows up. You can’t do much yet, other than delete the site. After about five minutes, I got an email telling me my site was ready. I clicked the URL, and there you go: Next, I configured an admin password. This takes you to the normal WordPress admin reset screen, where you enter your email address and a new password is mailed out. Nothing surprising here. The main WordPress dashboard page was surprisingly crap-free. That’s definitely a breath of fresh air after encountering all the upsells and crapware of previous reviews. There is a “WP Engine has your back” widget, but all it does is point you to some performance management features of the host dashboard. My next stop was Plugins and it was pretty much garbage-free (something of a rarity with WordPress hosting providers): There’s the Akismet Anti-Spam plugin that comes with most sites, and StudioPress (a WP Engine product) Genesis Blocks, a plugin that adds some editor features. The Themes area was equally un-hateful. Yes, WP Engine defaulted to its in-house theme, but Genesis is actually a fine base theme. Beyond that, it just had a few recent default WordPress themes installed. Overall, the WordPress install in WP Engine was clean and without either muss or fuss. It’s definitely workable. The rest of the WP Engine dashboard The first thing I like to do when looking at a new hosting provider is exploring their dashboard. Is it an old friend, like cPanel? Is it some sort of janky, barely configured open source, or homegrown mess? Or is it a carefully crafted custom dashboard? These are often the ones that worry me the most because they almost always hide restrictions that I’m going to have to work around somehow. You don’t really gain access to the WP Engine dashboard until after you install a site/environment: Once you do, a quick click on the site name gives you a more comprehensive tool: Yeah, that’s more like it. There’s a quick access button to PhpMyAdmin for database manipulation, another to launch the WordPress admin interface and quite a lot of setup options. I’m not going to go into them in-depth since this review still has quite a way to go, but I didn’t see (or not see) anything that would make me worry. All told, WP Engine seems to be quite comprehensive in terms of what it allows site operators to do. This might also be a good place to mention that WP Engine produces the Local WordPress hosting environment, for hosting WordPress on your development machine. This product used to be Local by Flywheel before WP Engine acquired it. I can personally attest to the quality of the Local implementation. As I mentioned in my development tools article, I use Local every day for coding and maintenance of the WordPress plugins I manage. It’s a very helpful tool. And, it’s free. Quick security checks Security is one of the biggest issues when it comes to operating a website. You want to make sure your site is safe from hackers, doesn’t flag Google, and can connect securely to payment engines if you’re running an e-commerce site of any kind. While the scope of this article doesn’t allow for exhaustive security testing, there are a few quick checks that can help indicate whether WP Engine is starting with a secure foundation. The first of these is multifactor authentication (MFA). It’s way too easy for hackers to just bang away at a website’s login screen and brute-force a password. One of my sites has been pounded on for weeks by some hacker or another, but because I have some relatively strong protections in place, the bad actor hasn’t been able to get in. WP Engine has a well-considered MFA implementation, allowing you to use SMS, Google Authenticator, or even Okta for enterprise SSO. This is for the main WP Engine dashboard. You, of course, can add a plugin to your WordPress site to put MFA on there as well. Also, the site created by WP Engine has SSL security by default. As you can see, the dashboard (and this also applies to the user-facing content) has a valid certificate and encryption. I didn’t have to set up anything I like to externally test SSL implementations using a test suite provided by SSL Labs. WP Engine passed easily:As my last quick security check, I like to look at the versions of some of the main system components that run web applications. To make things easy, I chose four components necessary to safe WordPress operation. While other apps may use other components, I’ve found that if components are up-to-date for one set of needs, they’re usually up to date across the board. Here are my findings (using the Health Check & Troubleshooting plugin), as of the day I tested, for WP Engine’s Managed Hosting Plus Startup plan: ComponentVersion ProvidedCurrent VersionHow OldPHP7.4.227.4.222CurrentMySQL/MariaDB5.7.34-37-log5.7.35/8.0.264 monthscURL7.58.07.78.042 monthsOpenSSLOpenSSL/1.1.1OpenSSL 1.1.1k34 monthsIn general, these results aren’t bad. You kind of need to know the component to know how to read these results. PHP is pretty much right on track. MySQL currently lives in two tracks, a maintained 5.7 track and an 8.0 track with newer technology. Both are supported by WordPress and as long as the 5.7 track is maintained and updated (particularly for security threats), it’s fine to be running 5.7.34. Oddly enough, Local (the local development environment owned by WP Engine I discussed earlier) defaults to MySQL 8.0.16. So much for consistency. Go figure. cURL is a little disturbingly out of date as is OpenSSL, but as the previous SSL test showed, the actual SSL encryption is solid, which is what we’re really concerned about. The bottom line is that WP Engine is on track for the core WordPress components and a little behind on supporting encryption and data transfer, but testing shows it’s not far enough behind to cause a security threat. Performance testing Next, I wanted to see how the site performed using some online performance testing tools. It’s important not to take these tests too seriously. These are just quick tests on a site with no traffic.That said, it’s nice to have an idea of what to expect. The way I tested was to use the fresh install of WordPress with the default installed theme. I then performance test the “Hello, world” page, which is mostly text, with just an image header. That way, we’re able to focus on the responsiveness of a basic page without being too concerned about media overhead. First, I ran two Pingdom Tools tests, one hitting the site from San Francisco and the second from Germany. Here’s the San Francisco test rating: Then I ran the test from Germany. The results were both quite good: Next, I ran a similar test using the Bitchatcha service: None of the tests showed bad performance, and I found the responsiveness of the WordPress dashboard to be snappy as well. Now, here’s the gotcha. Basic performance is fine, but we don’t have data for how the service will perform under load. Since you’re presumably buying a higher-end managed hosting service, you’re probably expecting some level of traffic. I say this a lot in my reviews, but take advantage of the money-back time period to fully test out results for yourself. You have 60 days with WP Engine. Make sure to use them. And if you run into performance issues, reach out to the company. Managed hosting services are supposed to provide better hands-on support, so use it. Support and money-back guaranteeThe company does have 24/7/365 live chat support. I tried it out at 1am on a Sunday morning (what? I’m a night person) and found the support representative to be both knowledgeable and friendly.WP Engine offers a 60-day money-back guarantee. Here’s a blog post that explains how to cancel the various types of service. Overall conclusion I got no complaints. No, seriously, I have no complaints. Other than a few component versions being out of date (but still within the system requirements for WordPress), I have nothing to ding them over. Setup was straightforward. The hosting dashboard, while not as comprehensive as cPanel, provided all the resources a well-equipped WordPress would require. The addition of development and staging versions, along with the transferable sites provides a lot of flexibility for a 1-site plan. SSL worked and passed my tests, and site responsiveness was good. Support was responsive, helpful, and intelligent in the middle of the night on a weekend. If you’re looking for a super-cheap hosting offering, this isn’t it. But if you’re serious about hosting your site, you could do a lot worse than WP Engine. I don’t do star reviews, but I’d give it a four (out of five). The only reason I wouldn’t give it a five is I’d never give a hosting provider a top rating on just a week or so of evaluation. You don’t really get to know your hosting provider until you’ve worked with them for a few years and resolved a few crisis events. That said, if I had to move my sites to another provider, I’d definitely consider WP Engine. You can follow my day-to-day project updates on social media. Be sure to follow me on Twitter at @DavidGewirtz, on Facebook at Facebook.com/DavidGewirtz, on Instagram at Instagram.com/DavidGewirtz, and on YouTube at YouTube.com/DavidGewirtzTV.

    ZDNet Recommends More

  • in

    MacBook, iPad Pro, and Windows laptop users: This $35 accessory is a must-have

    I test a lot of USB-C accessories to test, but few end up as part of my equipment. But there’s one accessory that I’ve had for over a year now, and I use it pretty much daily on my MacBook, iPad Pro, and any USB-C equipped Windows 10 laptops I happen to be using.

    It’s a hub. A small hub that fits onto a pocket or bag easily. And best of all, it’s only $32.99.It’s the Anker 7-in-1 USB-C hub.On the connectivity front, the hub comes with a single 4K 30Hz HDMI, a 100W Power Delivery USB-C port, a USB-C data port, microSD/SD card reader slots, and two USB 3.0 ports.It also comes with a 20cm USB-C cable attached. Initially, I thought this to be a weak link because if this broke the hub is trash, but after over a year of hard use, it’s still like new.Anker quality shines through.

    Must read: Apple releases massive mystery bug fix update for Macs
    It also comes with a carry pouch for keeping it scratch-free and any chunks out of the ports.The only port that’s missing is an Ethernet port, but to be honest I can’t remember the last time I needed to use one. If you want a very similar portable hub that has an Ethernet port, then Anker makes an 8-in-1 hub with that feature for $59.99.
    I’ve used this hub on dozens of devices and taken it with me on long trips, and it has not let me down once. All Anker hubs come with an 18-month worry-free warranty in the event of something going wrong. There are also many much bigger docks out there. Anker has the amazing PowerExpand Elite 13-in-1 dock, and Plugable has a range of docks and adapters to suit all needs, size constraints, and budget! 

    The docks market really has risen to the challenge of professional wanting to make the most of a limited number of USB-C ports.I’m curious to know what must-haves you use. Let me know!

    ZDNet Recommends More