You have probably seen a message, or email, or even a recent Facebook post claiming that a dangerous Facebook Hacker by the name of Jayden K Smith working his way through the Facebook community and hacking user accounts with ease. In fact, this "hacker" is so good that you are at risk if even one of your friends has him in their friends list. This is quite scary and also not real at all. Yup, that message, email, or post is just like every other chain message out there, completely full of crap.
Hate is a powerful item and when it spills out it can be violent, rude and many other things. Because of the power of hate found in images, media, mems, etc., many have wondered why there are not more efforts to prevent the posting or sharing of such information. After all why would a media (social or other) want to allow hate speech or images posted on their pages. Facebook took this thought process and turned it into a policy that is designed to help stop hate speech from showing up. Now the system has inadvertently started censoring the wrong people.
WikiLeaks is at it again with their "Vault 7" releases. This time part of the dump features a nice little took kit for continued exploitation of some Linux systems. The tool kit is called OutlawCountry and is, to be perfectly honest, not much more than a remote management, monitoring and exfiltration tool. It is intended to run in the background on a system after a vulnerability has been exploited to allow the payload to be pushed. It looks very similar to a tool that the NSA used for years and has now become the commercial product Kaseya.
For the last couple of days the world has been buzzing with news about the Petya malware. When the news of the outbreak broke on Tuesday morning, it was all about a new ransomware that was spreading around the globe. References to WannaCry were made and fingers pointed to the use of the same NSA exploit as the attack vector. However, Petya was not really like WannaCry in that there was no “kill-switch”. Wednesday morning the big players in the anti-malware and security markets had sent out their “what you should know emails” and a low-grade form of panic hit many enterprises.
In the early 2000s AMD was on top of the world, they had a desktop processor that was what everyone wanted. AMD was handily beating Intel in terms of performance and pushing x86-64 computing out to the world. In 2006 AMD made an odd decision to buy GPU maker ATi for a rather hefty sum. This one act threw AMD off their game so badly that they operated in the red for many years after the purchase. However, over the last 2-3 years AMD has made some well-planned changes internally. These changes included dropping the mobile focus and creating the RTG (Radeon Technology Group). They have secured some technologies through purchases and cleaned up some financially impacting deals.
Over the last couple of days, we have received information that would indicate nVidia is not moving to HBM 2 for their consumer GPUs (outside of some extremely high-end models). Instead, they appear to be focusing on improvements found in GDDR5X and GDDR6. Conversely, AMD appears to be focusing on HBM for many of their high-end and even some mid-range cards. The two very different paths has sparked something of a debate amongst fans of both products (as you can imagine). The questions are, why chose one over the other at this point and is HBM a truly viable option for AMD?
Remote management and access tools are great things for IT staff to use, but if they are not set up correctly or they have bugs hidden in the code they can quickly become a nightmare. Intel’s AMT (Active Management Technology) suite of tools recently was found to have a rather nasty little surprise hidden in them. It seems that a flaw in the way their SOL (Serial on LAN) tool runs combined with the way Windows deals with AMT allowed attackers to use AMT to deploy malware and to exfiltrate data from a compromised system.
CD Projekt RED has found themselves the victim of both data theft and now blackmail. At least that is what we are hearing from their Twitter account. According to CD Projekt, someone has made off with information that relates to their upcoming game Cyberpunk 2077. The Tweet goes on to say that the files are old and are not representative of the current version of the game. They also say they are not planning on giving in to the ransom demands. It is something of an interesting situation to be honest.
Computex 2017 is done, the hangovers are pretty much gone, and what do we have to show for it? Well… we have a new fight for fanboys and review sites alike to talk about. This is the fight between AMD’s Threadripper and Intel’s New X series CPUs. The crux of the argument is that Intel’s 18 Core i9 with 44 PCIe lanes is a reactionary move to a leak of Threadripper’s specifications.
This is going to be a little bit of a departure from how we would normally approach covering specific technology. Instead of addressing the state of hardware based on what we have actually worked with, we are going to look at VR from the standpoint of a consumer looking to buy for the first time. There are a couple of reasons to do this; the first is that we do not have either an Oculus Rift, HTC Vive or any other PC based VR technology. We do have the Oculus powered Gear VR, but that is in a category all on its own which we will cover in some detail below. So with the preface out of the way, let’s get started