The ROG Rapture GT-BE19000AI is a powerful gaming router with onboard AI to manage your network. But those perks come with a ...
The ASUS RT-BE58 Go, first announced at CES 2025, is now available. Among other things, the new router makes Wi-Fi ...
Besides the default router mode, the GT-BE19000AI can also function as an access point (either as a single unit or as part of ...
The Asus RT-AC88U ($299.99) is a dual-band 802.11ac router with a massive feature set and an equally large price tag. It uses Multi-User Multiple Input, Multiple Output (MU-MIMO) technology to serve ...
Coming soon, the Asus RT-AX68U can create a secure VPN connection to your home network from anywhere in the world when you're using public Wi-Fi. Ry Crist Former Senior Editor / Reviews - Labs ...
Companies love to pack AI into their devices these days, for better or for worse. Asus says that the ROG Rapture GT-BE19000AI is the first gaming ...
When was the last time you actually got excited over a network management app? For most of us, the answer is probably “never.” But as our Gordon Ung shows in the above video, Asus’s Router app might ...
Not every VPN works with an Asus router, and not every VPN that does can be relied on. Here's our list of the best Asus router VPNs and how to use them. Asus manufactures some of the most popular ...
Getting WiFi to every corner of your home is made much easier these days with a mesh network, which uses a specialized router and individual nodes that can configure themselves. Companies like Netgear ...
UPDATE 6/3: In a statement, Asus confirms the breach affects RT-AX55 or AC3100/AC3200 routers, but says "these vulnerabilities can be fixed." It recommends that those with an affected Asus router (see ...
If you're running an Asus wireless router, chances are good that someone inside your network can take full administrative control of it thanks to a currently unpatched vulnerability in virtually all ...
A vulnerability in Asuswrt, the firmware running on many wireless router models from Asustek Computer, allows attackers to completely compromise the affected devices. Malicious hackers, however, need ...