After a long and complicated battle Kim Dotcom and the other Megaupload employees (Mathias Ortmann, Finn Batato, and Bram van der Kolk) might have lost an important battle. A district judge, Judge Nevin Dawson, has ruled that the US can…
Hello Kitty User Database found open on the Internet
Published in News
22 December 2015
Rate this item
(0 votes)

Hello Kitty User Database found open on the Internet

The push into the cloud has been a concerning one as has to the glut of devices, games, services and other that rely on the cloud to exist. One of our main areas of concern is with the storage of…
Rumor says AMD moving to Samsung for 14nm GPUs
Published in Leaks and Rumors
22 December 2015
Rate this item
(0 votes)

Rumor says AMD moving to Samsung for 14nm GPUs

Around 2013, AMD entered into an extended partnership with a group of companies to create the Heterogeneous Systems Architecture Foundation. These companies mostly ARM licensees and included Samsung, MediaTek, Texas Instruments (Ti), AMD, Imagination, Qualcomm, and even ARM themselves. The…
Juniper Admits to backdoors in their ScreenOS code as far back as 2012
Published in News
Juniper has acknowledged that “unauthorized code” was somehow inserted into their ScreenOS. The code appears to have been around since at least 2012 which means that it went unnoticed during multiple code updates, patches and even full version updates. Although…
It seems that Phillips does not want you to use their hue application with just anyone. If you are not aware, hue is a system that allows you to control special light bulbs. You can turn them on and off,…
MacKeeper did not keep security in mind when building their own systems
Published in News
You know that awkward moment when your security company actually fails and ends up exposing your data? Well that is happening for a, less than loved, Mac application called MacKeeper. It seems that they forgot all about data management and…
Open Access to the GPU. Is this an open invitation to Malware?
Published in News
The average GPU is a pretty powerful computational device. The highly parallel design and efficient memory structure means that you can execute operations at a rate that puts most CPUs to shame. With the advent of Cuda and OpenCL the…
Apple has bought a new factory in Taiwan, possibly to make new screens
Published in News
Not that long ago there were rumors popping up that Apple was buying a failed division of Qualcomm. This was Qualcomm’s Interferometric Modulator Display (also known as IMOD or Marisol). The concept was brilliant even if the execution was not.…
HBM Vs GDDR in 2016 for the GPU crown.
Published in Editorials
14 December 2015
Rate this item
(0 votes)

HBM Vs GDDR in 2016 for the GPU crown.

As most people are aware, AMD dropped the first GPUs to utilize HBM (High Bandwidth Memory). These GPUs use a form of HBM called 2.5D which requires the use of an interproser layer than both the memory and the GPU…
Can Anonymity on the Internet Really Happen? MIT Says Yes.
Published in News
Privacy is something that many people think they want and have on the internet. Of course, most of us actually know that Privacy is not something that really exists in the broader internet. Unless you control all points in the…
In September of 2015 (that would be this year) AMD announced that they were splitting off their GPU business into the Radeon Technologies Group (RTG). This move had a number of reasons (most good) and would serve to distance the…
My Quantum Computer can beat up your PC says Google and NASA
Published in News
The idea of Quantum computing has been with us since the dawn of science fiction and it is a very cool one. In recent years we have seen advances that have made this once theoretical concept turn into a reality.…
Microsoft to push even harder to get users to upgrade to Windows 10...
Published in News
Just when you thought it could not get more annoying, Microsoft has turned up the Windows 10 update notifications. The little nudges for Windows 8.x users pop up in the corner (systray) and also when you boot up your PC…
When will enough be enough when it comes to IoT security? VTech and Hello Barbie
Published in Editorials
When things are not quite right you always hope for that “ah-ha” moment when everyone realizes the issue and will actually begin to work on a solution. For connected devices we have been hoping for that since they were first…
Asetek targets Giagbyte and AMD in patent dispute with Cooler Master
Published in News
Asetek is hard at work throwing its legal muscle around and they have rolled AMD and Gigabyte into their efforts. After winning a patent suit against Cooler Master over technology found in the pumps on some of their All in…
07 December 2015
Rate this item
(0 votes)

Bendgate: it’s not just for iPhones anymore.

Not all that long ago someone found out that Apple’s iPhone was not all that strong and could be damaged with little pressure. This issue became known as Bendgate… the use of the word gate still following us from the…
It’s a failure of imagination that will always get you
Published in Editorials
Back in 2007 or so I was asked to write a white paper on the subject of why Intel was able to pass AMD as quickly as they did. This is back in the AM2+ days when Intel was dropping…
NSA mass data collection to stop in 20 days, but just on paper.
Published in News
In the post-Snowden era the idea that government agencies are spying on us is no longer the real of Movies/TV or conspiracy theorists. It is fairly well documented that this is happening every day. The question has moved from what…
It seems that at least one person is rather annoyed at AMD for making claims about certain FX series CPUs running Bulldozer cores. On November 4th the news went out that Tony Dickey had filed a class-action lawsuit on behalf…
Cybersecurity is a fairly common buzz word used in Washington these days. It is tossed around to scare people that are ignorant of the way computer systems work so that legislation that is exceptionally pro-corporate friendly and anti-consumer can be…
The cloud, IoT, vendors and security: things that do not go together.
Published in Editorials
This is not the first time that I have spoken out about cloud computing (internet based, or the Internet of Things and the way they are impacting the ability to secure a network. It is also not going to be…
08 October 2015
Rate this item
(0 votes)

NETGEAR drops the WAP720 with Ensemble Mode. We take a look Featured

WiFi is one of those services that people simply expect to see these days. When you walk into just about any public building you are going to start looking for the “free” WiFi that they have. Most people do not stop to think about that that looks like behind the scenes especially when you are in a smaller business. In a large business you have multiple wireless access points (WAPs) that are run by a central controller. This centralized control system makes it relatively simple to control both the business side and the guest side of the wireless network. These tools can be very expensive and out of the budget range for most small companies. Instead a small business will end up with either an edge device with built in wireless (and really bad service), a single WAP or multiple individual WAPs that need to be managed independently and have their own problems.

Potential New Exploit found in OpenSSL gets around latest hotfix
Published in News
It seems that someone may have found a way around at least one of the latest hot fixes for OpenSSL. According to some talk around the darker places on the internet, a rehash of metadata can allow a malicious individual…
28 September 2015
Rate this item
(0 votes)

Possible Breach At Hilton Highlights PoS Risk

Just when you thought it was safe to use your credit card we are hearing rumblings of a breach at Hilton. According to Brian Kerbs and some of our own sources a payment card breach has taken place and the…
Hackers using unencrypted satellite communication to hide C&C servers
Published in News
Security and malware research company, Kaspersky has recently released a paper describing what they say is the “ultimate level of anonymity” used by any malicious hacking group. In their report they describe a new attack by the group Ouroboros as…