Articles

404 ERROR: REQUEST COULD NOT BE FOUND

The page that you have requested could not be found at this time. We have provided you a list of related content below or you can use our site search to find the information that you are looking for.

AMD Investor Slides Confirm 2019 CPU Releases

On their investor website, AMD recently published a set of slides that confirm the release of 3rd generation Ryzen and Threadripper CPUs some time in 2019. Pro variants of the 2nd generation Ryzen APUs are slated to come out this Spring, while 3rd generation Ryzen desktop processors are scheduled for a "mid-year" 2019 release.
3rd generation Threadripper CPUs didn't get a release date more specific than "2019," and AMD's 7nm "Navi" and 7nm+ "Next-Gen" GPU architectures are said to be coming sometime between now and 2020. The company also reitarated that the somewhat mysterious "Radeon Vega Mobile" GPU which, as far as I know, has only popped up as an optional upgrade in the Apple Macbook Pro, is still part of their 2019 product stack. Discussion
Posted by alphaatlas March 07, 2019 10:05 AM (CST)

Tesla Demonstrates Its New Security System Called Sentry Mode

As we reported before, Tesla has added a new security feature to its cars called Sentry Mode. Sentry Mode uses the car's cameras to monitor its environment to detect potential threats. It will display a message on the touchscreen and record the encounter if the threat is minimal. But if it determines that the threat is severe, Sentry Mode will perform the same actions, but also play loud music through the car's stereo system and sound an alarm. Tesla has released a video of the security system in action.

If a car switches to "Alarm" state, owners will also receive an alert from their Tesla mobile app notifying them that an incident has occurred. They'll be able to download a video recording of an incident (which begins 10 minutes prior to the time a threat was detected) by inserting a formatted USB drive into their car before they enable Sentry Mode.

Discussion
Posted by cageymaru February 21, 2019 7:51 AM (CST)

3M Demonstrates PC With Submersion Cooling

A 3M employee demoed a CPU cooled with a low-boiling-point liquid years ago, and since then, some server manufacturers have shown off similar systems. But this year, that same 3M employee decided to build a more compact version of the original demo. Check out the final build below:
At least some of the previous demos used 3M Novec 7200 or 7100 fluid, which have boiling points well below 100C. When under a stressful workload, the CPU's IHS boils the volatile liquid, which is re-condensed and cooled by what appears to be a 360mm radiator. Like the previous demo, the entire system is sealed, but it seems that 3M hopes manufacturers will make such cooling systems more accessible in the future. Fuzzie documented the entire build in a series of videos, and it looks like this isn't the end of his experimentation. Discussion
Posted by alphaatlas February 11, 2019 10:06 AM (CST)

Millions of Files Leaked from Oklahoma Department of Securities Database

The UpGuard Data Breach Research team, who previously uncovered data breaches in U.S. voting systems and an Experian partner, recently exposed a massive leak from Oklahoma's Department of Securities. The contents of the files "ran the gamut from personal information to system credentials to internal documentation and communications intended for the Oklahoma Securities Commission," but the sheer bulk of the 3TB of data is made up of Outlook backup archives dating back to at least 1999, while some data goes back to 1986. Among other things, the leak contained the social security numbers of "approximately ten thousand brokers." identifying information on over a hundred thousand brokers, sensitive medical data, credentials for various IT services, and files related to investigations and FBI interviews. While UpGuard's post wasn't particularly critical, Chris Vickery, head of research at UpGuard, told Forbes that the department's response was "irresponsible," as they "didn't check to see what was done with the mass of data downloaded by the researchers." UpGuard also found some glaring security oversights in the leaked data, such as decrypted versions of documents being stored in the same folder as encrypted versions.

Businesses and organizations naturally accumulate stores of data, both because of the value of that data and to comply with retention policies. Creating backups is a good practice to increase resilience in the face of attacks like ransomware. Backups are also necessary for migrations to ensure data can be recovered as businesses adopt newer and more secure technologies. But as this case highlights, the final crucial step is to maintain control over every copy of those data stores. The good news is that, while the contents of the server extended over years, the known period of exposure was quite short. Thanks to the Data Breach Research team's techniques for quickly identifying risks, the exposure was identified only one week after it showed up in Shodan's catalogue of global IP addresses. Shortening the window of exposure reduces the likelihood of other parties accessing the data and enables its owners to take responsive measures before the data is used maliciously.

Discussion
Posted by alphaatlas January 17, 2019 9:42 AM (CST)

NVIDIA Demonstrates Issues with Non-Validated FreeSync Monitors at CES 2019

At CES 2019, NVIDIA announced that it was going to support Adaptive Sync monitors that passed its certification process. Out of over 400 monitors tested, only 12 were deemed "G-SYNC Compatible." NVIDIA has created a display at CES 2019 to highlight issues that non-validated FreeSync monitors may exhibit. Gordon Mah Ung of PCWorld went by the display and documented some of the issues that NVIDIA was concerned about.

Nvidia says that not all FreeSync monitors are created equal -- in fact only 12 out of more than 400 are certified to be G-Sync-compatible. Gordon checks out some examples of FreeSync monitors that don't stack up.

Discussion
Posted by cageymaru January 08, 2019 5:17 PM (CST)

NVIDIA GeForce RTX 2060 Pricing and Performance Leaked

VideoCardz has returned with some key information on the RTX 2060: the card, which will cost $349 and perform similarly to the GTX 1070 Ti, can supposedly provide a "playable experience" in Battlefield V with ray-tracing enabled...in 1080p, at least. (Battlefield V: RT Off: 90 FPS, Battlefield V: RT On + DLSS Off: 65 FPS, Battlefield V: RT On + DLSS On: 88 FPS.)

We can now confirm that GeForce RTX 2060 features 1920 CUDA cores, 240 Tensor cores, 30 RT Cores, 120 TMUs and 48 ROPs. The boost clock of 1680 MHz will be the same for reference and Founders Edition cards. Board partners will offer stock and factory-overclocked models. The RTX 2060 is a mid-range model replacing GTX 1060 from Pascal architecture. Throughout Reviewers Guide, NVIDIA claims it will offer comparable performance to GeForce GTX 1070 Ti.

Discusion
Posted by Megalith December 29, 2018 4:10 PM (CST)

Researchers Demonstrate Hot Tub Hack

Some hot tubs have apps that allow users to control the tubs remotely. But security researchers from Pen Test Partners found a small security flaw in one of those implementations... apparently, there is no security. A wifi access point on the tub can be configured to act as a client accessible from the web, and the researchers were able to remotely obtain the MAC addresses of victim's hot tubs with some simple API calls. With very little effort, the researchers were able to identify about 30,000 hot tubs exposed on the web, and manipulate their temperatures or turn blowers and pumps on and off. Thanks to The BBC for reporting the security flaw, and check out a video of the hot tub hack below:

Consumer IoT security is not in a good place. These findings underline that. Worse, the iDigi service is also used to control smart healthcare appliances. Who is to say if those were correctly secured? We emailed Balboa Water Group on 28th November, explaining the flaw and asking for an acknowledgement so that we could start responsible disclosure. We had no reply. We tried again on 30th November, asking for an acknowledgement by 10pm GMT on Friday 3rd December. Again we had no reply. We then asked the BBC if they could use their influence to elicit a response. They kindly obliged and, as if by magic, we had a response from BWG within an hour of the BBC emailing them. BWG explained to the BBC that they had not implemented user accounts for "ease of use", and that the static password was also a conscious choice! BWG also asked for the broadcast to be delayed, for no other reason than they didn't want to take down the API over the holiday season. Hardly compelling. They only took action when their brand was at stake, not their customer's privacy or security, yet were happy to expose users in the meantime...

Discussion
Posted by alphaatlas December 26, 2018 9:42 AM (CST)

Red Dead Redemption 2 PC Footage Allegedly Leaked

PC Gamer spotted some footage of what appears to be Red Dead Redemption 2 running on PC. While the "leak" was quickly taken down, other channels re-uploaded the footage, which features a few seconds of gameplay and a "settings" menu with various PC graphics options. While the video is somewhat out-of-focus, settings such as FXAA, VSync, and Texture Quality can be made out, and whoever leaked the video changed resolution while the game was running. Check out the "leak" below:
Rockstar hasn't commented on the leak, and there's no proof that it's legit. But if this footage is a hoax, it's a very convincing and elaborate one. Discussion
Posted by alphaatlas December 19, 2018 11:05 AM (CST)

GDDR5X GTX 1070 Listed on Zotac Website

Earlier this week, TechPowerUp spotted a GTX 1070 SKU with GDDR5X memory on Zotac's website. Zotac has since taken the listing down, but Google captured an incomplete copy of the page before they did. Whether the GDDR5X listing was a typo or a premature publication is unclear, but manufacturers have released some GTX 1060s with GDDR5X memory.

Much like the GTX 1060 6 GB GDDR5X, this otherwise factory-overclocked ZOTAC card sticks to a memory clock speed of 8.00 GHz, despite using GDDR5X memory chips that are rated for 10 Gbps. It features 8 GB of it across the chip's full 256-bit memory bus width. The GPU is factory-overclocked by ZOTAC to tick at 1607 MHz, with 1797 MHz GPU Boost, which are below the clock-speeds of the GDDR5 AMP Extreme SKU, that has not just higher 1805 MHz GPU Boost frequency, but also overclocked memory at 8.20 GHz. Out of the box, this card's performance shouldn't be distinguishable from the GDDR5 AMP Core, but the memory alone should serve up a significant overclocking headroom.

Update 12/6/2017: Zotac told PC Gamer "It will only support the normal GDDR5." Thanks to Drep for spotting this. Discussion
Posted by alphaatlas December 06, 2018 11:27 AM (CST)

Bethesda Support Ticket System Leaked Customer Information

Today's data leak of the day comes from... Bethesda. Recently, Bethesda promised to give buyers of Fallout 76's $200 Power Armor edition a real canvas bag. But to do that, customers had to create a support ticket and submit proof of purchase, which allegedly included a receipt containing credit card information, phone numbers, home addresses, and more. After submitting the tickets, users started to notice that they could see everyone else's tickets, as well as the proof they submitted. Naturally, this started to blow up on Twitter, Reddit, YouTube, and Bethesda's official forums. PCGamesN says Bethesda's support site went down when they first noticed the issue, and that the receipts included credit card numbers, while Bethesda customer support claims that the issue is now "fixed". Thanks to Ocellaris for the tip.

When Bethesda offered to send out canvas bag replacements for those who bought the Fallout 76 Power Armor Edition, I'll admit that I thought the problems were resolved and the saga of the canvas bag was done for. Clearly, that belief was a naive one.

Discussion
Posted by alphaatlas December 05, 2018 7:54 PM (CST)

Intel Demonstrates MESO Logic Device as Alternative to CMOS

Working with researchers at Berkeley, Intel has "invented" a magneto-electric spin-orbit device that could theoretically operate 10-30 times more efficiently than today's consumer electronics. While Intel doesn't directly comment on the rapidly approaching limits of CMOS scaling in their press release, they do say they're working on technology "that will emerge in the next decade for the beyond-CMOS era." In an interview, Ramamoorthy Ramesh, a scientist at Berkeley Lab, said the new technology "will take a decade," and noted that the proposed devices could operate at about 0.1V.

"MESO is a device built with room temperature quantum materials," said Sasikanth Manipatruni, senior staff scientist and director of Intel Science and Technology Center on Functional Electronics Integration and Manufacturing. "It is an example of what is possible, and hopefully triggers innovation across industry, academia and the national labs. A number of critical materials and techniques are yet to be developed to allow the new type of computing devices and architectures."

Discussion
Posted by alphaatlas December 03, 2018 12:45 PM (CST)

Sennheiser HeadSetup Pro Vulnerability Leaked Private Keys

Sennheiser HeadSetup and HeadSetup Pro were recently updated because the softphone applications installed root certificates and then leaked the private keys. Malicious actors could extract the private keys and use them to spoof other websites and software publishers. To fix the issue, Microsoft recommends that users update their HeadSetup and HeadSetup Pro software to the latest version.

Upon such a rare inspection of the Trusted Root CA store, we stumbled across two unexpected root certificates. The issuer names in these two certificates indicated that they have a connection to the Sennheiser HeadSetup utility software installed on our systems in conjunction with the connected headsets of this manufacturer. We found that - caused by a critical implementation flaw - the secret signing key of one of the clandestine planted root certificates can be easily obtained by an attacker. This allows him or her to sign and issue technically trustworthy certificates. Users affected by this implementation bug can become victim of such a certificate forgery, allowing an attacker to send e.g. trustworthy signed software or acting as an authority authorised by Sennheiser.

Discussion
Posted by cageymaru November 28, 2018 8:07 AM (CST)