Browsing tag

CPU

Nvidia CEO Slams Intel’s OneAPI, Says “Programming Isn’t As Simple”

Intel has been working on the “OneAPI Project” for a long time now. It is a unified programming model that aims to simplify application development across different computing architectures. However, Nvidia CEO Jen-Hsun Huang doubts the viability of Intel’s unreleased OneAPI model. At Nvidia’s Q2 2019 earning reveal, Huang slammed Intel’s ongoing project. Huang said […]

How To Check CPU Temp? 5 Useful Ways To Fix CPU Overheating Issues

So guys, what are some ways to check CPU temperature of your machine? Yeah, having an idea about how hot your device could get is more of a necessity than a fun task. You might have heard about the various computer temperature monitor tools that you can install on your computer to monitor the temperature […]

Guy Creates A Device To Remove Garbage Collection Tasks From CPUs

Garbage collection is a process that is always working in the background to delete redundant data from applications to free up extra memory space. The process of garbage collection is supposed to relieve programmers from doing the job manually. However, the CPU consumes a lot of computational power (10% or more) to accomplish automated tasks. To […]

Intel CPUs affected by speculative execution vulnerability

The flaw is present in all Intel generations after the first generation of Intel Core A speculative execution vulnerability (dubbed Spoiler) has been found in several generations of Intel CPUs, report network security and ethical hacking specialists from the International Institute of Cyber Security. The flaw could be exploited with a malicious JavaScript hosted on […]

Is cryptojacking as lucrative as it seems?

Cryptocurrency online mining practice has become very popular According to cyber security organization specialists, one in every 500 of the one million most visited websites according to Alexa contains cryptocurrency mining software based on the network that begins a mining process as soon as the website is opened in the browser; yet, despite having become a common […]

Leaked information from 31K GoDaddy servers

Apparently the leak is due to an unsecured bucket Amazon Web Services GoDaddy is the most recent victim of cybercriminals groups and has joined a long list of companies that saw their confidential data leaked by Amazon S3 buckets without the necessary security measures. GoDaddy, the world’s leading domain name registration platform, has more than 18 million […]

Spectre attack variant can be remotely mounted to extract sensitive data

What we know so far about Spectre attacks is that it relies upon execution of malicious code. The code is executed on computers having speculative-execution design flaws in processor chip; once a device is compromised, it becomes possible to obtain sensitive data such as passwords, PINs, and keys. Such data is usually stored in the […]

Spectre bug protection forcing Chrome to use 10 to 13% more RAM

The entire tech industry was shaken after the discovery of Meltdown and Spectre, critical security bugs that were found in almost all modern computer processors, and the aftershocks are still being observed. Chrome is the newest victim of the collateral damage that these bugs have brought forth. Reportedly, Google Chrome 67 has now enabled Site […]

Microsoft bug bounty program: $250k for reporting Meltdown & Spectre type flaws

The bug bounty program will remain open until December 31st, 2018. Recently, the identification of serious CPU flaws called Spectre and Meltdown shook the tech community. Although the gravity of damage has been controlled considerably still there is room for mitigation. Perhaps that’s the reason why Microsoft has decided to roll out a new bug bounty […]

Keep Your Home Warm with this cryptomining heater

Recently, a French startup Quarnot introduced a cryptomining heater that is capable of paying for itself at some point through harnessing huge reserves of heat that get generated while CPU is busy mining for the cryptocurrency. Labeled as Quarnot’s QC1, the heater is said to keep your house warm during the torturous winter season and […]

139 Malware Samples Identified that Exploit Meltdown & Spectre Flaws

Hackers could be close to developing malware that exploits flaws, suggests a German cybersecurity firm. AV-Test, an independent German antivirus testing and security software company, has managed to identify nearly 139 malware samples that most probably indicate growing craze among cybercriminals to exploit the recently discovered CPU bugs Meltdown and Spectre. However, the majority of […]

How To Check Your Linux System for Spectre Meltdown Vulnerability

Spectre & Meltdown Checker A simple shell script to tell if your Linux installation is vulnerable against the 3 “speculative execution” CVEs that were made public early 2018. Without options, it’ll inspect your currently running kernel. You can also specify a kernel image on the command line, if you’d like to inspect a kernel you’re […]

Intel Chips Vulnerable To Hack

One of the biggest names in IT industry, Intel, has verified a report stating that some microprocessors have been built containing flaws in their design, leaving them vulnerable to hacking . According to reports, every computer that contains microprocessors of Intel from the last decade seems to be affected due to a ‘bug’ that enables […]

Multiple Intel Processors Generations Hit by Serious Security Flaw

Almost all Intel Processors Generations are impacted by the flaw while Intel CPUs are facing 30% performance hit. A Linux kernel development site LWN has reported that there is a serious hardware bug in modern Intel CPUs due to which an attacker can access low-level kernel memory. The memory normally is protected from higher level access from […]

​Opera just added a Bitcoin-mining blocker to its browser

Norwegian browser maker Opera has launched the beta version of Opera 50, the first popular browser to integrate a built-in cryptocurrency-mining blocker. The feature offers a new defense against the rise of cryptojacking or browser-based cryptocurrency miners that use a site visitor’s CPU without gaining the owner’s consent. Crooks are increasingly hiding JavaScript miners on […]

Linux Lexicon — How Does Linux Kernel Work?

Short Bytes: The Linux kernel is the most used piece of software in the history of computing. It’s everywhere. It’s in computers, servers, phones, TVs, set-top boxes, submarines, airplanes, self-driving cars, and it even runs the International Space Station. But how does it work? That’s more than a mouthful, so I’ll try to break it up […]

Intel Refutes Claim That It Includes Backdoors in Its CPUs

Company also doesn’t support encryption backdoors. Via a statement from Steve Grobman, Chief Technology Officer for Intel Security, Intel has denied claims made by hardware security expert Damien Zammit, who detailed a secret subsystem in Intel x86 CPUs that could have the ability to function as a secret backdoor. The issue brought up by Zammit revolves […]