Category Archives: Tech ARP Articles + Editorials

You will find all our editorial content here – articles, reviews, guides, editorials, technology reports, etc.

Don’t forget to BOOKMARK, and SHARE our articles with your friends!

This iThemes Security Setting Can Block Search Engine Bots!

We were recently beset by a sudden, MASSIVE drop in the number of search referrals from Google. We discovered that something was blocking search engine robots from accessing our sitemaps or crawling our website!

At first, we though it was due to a CloudFlare SSL configuration. But now, we have confirmed that it is due to an iThemes Security feature!

It is critical that you check and make sure that this iThemes Security setting is not preventing search engine robots from reading your sitemaps, and crawling your website.

 

iThemes Security

Formerly known as Better WP Security, iThemes Security is a very popular WordPress security plugin. While the paid Pro option offers a ton of cool security features, even the free plugin gives you the ability to lock down WordPress, fix common holes, stop automated attacks and implement a blacklist (this is a pivotal feature in this article).

 

What Happens If You Block Search Engine Bots?

if you block search engine bots accidentally or otherwise, you prevent them from indexing your website. This essentially makes your website “invisible” to search engines. Your website pages will no longer appear when people are searching for a relevant topic.

How does that happen?

  • Your website pages no longer appear in Google searches. If Google can’t see them, Google cannot display your pages in search results!
  • Even if your website pages do appear in Google searches, the links may be corrupt or nonsensical. Look at this example of this search result which leads to a bad link.

  • The description of your website page may also be nonsensical, as the example above also demonstrates.

 

This iThemes Security Setting Can Block Search Engine Bots!

A key feature of iThemes Security is the ability to set up a blacklist. iThemes Security will automatically populate the blacklist with the IP addresses after a number of failed attempts to login. This prevents a malicious attacker from trying to brute force its way into your system.

Unfortunately, it can falsely detect search engine bots as malicious hackers, and add them to the blacklist. That was precisely what happened to us.

Google reports that all of our sitemaps are inaccessible. Here is a view showing all five of our sitemaps were inaccessible.

If you click on the reported errors, they will all show HTTP 403 error (Forbidden).

You can verify if any search engine bot is being blocked by keying in the sitemap (or robot.txt or your website) at Redirect Checker. You can also try loading the sitemap or robot.txt in your own web browser.

If Redirect Checker or you have no problem accessing your sitemaps or robot.txt file, then something is blocking the Googlebot (or other search engine robots) from accessing your sitemaps, or crawling your website. That “something” is most likely iThemes Security’s blacklist.

 

The Solution

The solution is simple.

  1. Log into your website’s WordPress admin panel.
  2. Go to Security -> Settings.
  3. Look for the Banned Users section, and click on Configure Settings.

  1. In the Banned Users page, you will see a list of banned IP addresses.
  2. Delete the whole list of banned IP addresses.

  1. Uncheck the Ban Lists option.

  • Click Save Settings, and that’s it! The search engine robots will now be able to read your sitemaps!

 

Pro Tips

[adrotate group=”2″]

For those who still want to use the blacklist to block malicious attackers, here are the IP addresses used by various search engine robots.

Google will eventually read your sitemaps and reindex your website. But you can speed things along by :

Both guides were written with help from Kok Kee from Nasi Lemak Tech!

 

Suggested Reading

Go Back To > Articles | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

New Samsung Galaxy S9 Bixby Features Demonstrated!

One of the key features of the new Samsung Galaxy S9 is the improved Samsung Bixby capabilities. What’s new in the Samsung Galaxy S9 Bixby? How about AR translation and AR assistance?

Yes, it’s all about augmented reality with the new Samsung Galaxy S9 Bixby virtual assistant! But how useful are they? Check out the two videos and find out!

 

Samsung Bixby

Samsung Bixby was first introduced with the Galaxy S8 as a replacement for S Voice. Samsung even introduced a dedicated Bixby button for quick access. However, it was panned for its limited utility, and Samsung eventually allowed users to disable the Bixby button (but not repurpose it).

Critics expected Samsung to quietly ditch Bixby in the Galaxy S9, or at least the dedicated Bixby button. But as we shared in our early coverage and leaks on the Galaxy S9, it will come with a dedicated Bixby button.

 

The New Samsung Galaxy S9 Bixby Features

Instead of just admitting defeat, Samsung doubled down on Bixby. Not everyone gets things right the first time, after all; and virtual assistants like Bixby are the future. The pressure was on the team to make sure the Samsung Galaxy S9 Bixby will actually be useful to its users.

Live Translation

The original Samsung Bixby is capable of live translation, so a more accurate description of this new feature is AR (augmented reality) Translation.

In the original Bixby, the translation appears as a separate card. But in the new Samsung Galaxy S9 Bixby implementation, the translation appears as part of the image. Hence, our opinion that it should be called AR Translation.

In fact, it is smart enough to take note of the font and background of the text being translated, and render the translation as if it was the original text!

This is, without doubt, a truly useful combination of Bixby and augmented reality!

[adrotate group=”1″]

Improved Bixby Vision

The Samsung Galaxy S9 Bixby Vision has been improved. Again, it makes use of augmented reality (instead of separate information cards), to help you locate the information you need.

Point Bixby Vision at an object to get information on it, like the calorie count of a food item. Point it at a landmark, and it identifies the location and tells you about prominent establishments nearby. Point it at the sky and it gives you the current temperature and weather report.

While many of these features are already present in the original Bixby, the presentation of the information in augmented reality in the Galaxy S9 Bixby implementation makes it more intuitive to use.

Go Back To > Articles | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

The Intel Spectre Reboot Issue – Everything You Need To Know! Rev. 3.0

The efforts to mitigate the threat of the Meltdown and Spectre exploits is officially WORSE than the threat itself. Many Intel systems are randomly and spontaneously rebooting after installing Intel Spectre 2 patches. No shit. Here is our continuing coverage of the Intel Spectre Reboot Issue!

 

Article Update History

Click here for the Article Update History

Updated @ 2018-03-06 : Added the latest updates on the issue, as well as the new Intel Spectre 2 microcode revision guidance slides.

Updated @ 2018-02-22 : Added the latest updates on the issue, as well as the new Intel Spectre 2 microcode revision guidance slides.

Updated @ 2018-02-14 : Added the latest updates on the issue, as well as the new Intel Spectre 2 microcode revision guidance slides.

Updated @ 2018-02-10 : Added a new section on the Intel Spectre 2 Microcode Update Schedule, and updated various parts of the article. Removed 80 Intel processors that have just been confirmed not to be affected by the buggy microcode updates.

Updated @ 2018-01-26 : Added the Intel Coffee Lake, Intel Xeon Scalable and Intel Xeon W family of processors to the list of affected CPUs. Added the updated Intel Spectre 2 Microcode Update Guidance.

Updated @ 2018-01-23 : Added a new section on the root cause of the spontaneous reboot issue, and updated guidance on what you should do about this problem. Also added the Intel microcode revision lists. Removed 129 workstation / server CPUs, 105 desktop CPUs and 143 mobile CPUs.

Updated @ 2018-01-18 : Added the latest development on the Intel spontaneous reboot issues, including a greatly-expanded list of affected Intel CPUs.

Updated @ 2018-01-16 : Added the full list of Intel CPUs with reboot issues

Originally posted @ 2018-01-13

 

Spontaneous Reboots With Spectre 2 Patches Updated!

On 11 January 2018, the WSJ reported that Intel was quietly asking their cloud computing customers to hold off installing Meltdown and Spectre patches because “the patches have bugs of their own“. Specifically, there were three bugs in the microcode patches they released.

In a blog post posted on the same day, Intel Executive Vice President and General Manager of the Intel Data Center Group, Navin Shenoy confirmed that Intel received reports of “higher system reboots” after applying those updates.

Basically, these systems would randomly and spontaneously reboot after installing those patches. Not something you want your computer to do, never mind servers that cater to tens or hundreds of thousands of users.

He initially confirmed that the affected systems were running Intel Broadwell and Intel Haswell CPUs, and that the issues affected both client (desktop, mobile, workstation) PCs, as well as data center servers.

But in an update a week later, Navin revealed that the newer Kaby Lake and Skylake CPUs, as well as older Sandy Bridge and Ivy Bridge processors, were also experiencing spontaneous reboot issues after updating their firmware.

Although not explicitly mentioned, the latest Intel Coffee Lake CPUs are also affected by spontaneous reboots. Hidden in their microcode revision guidance was a reference to the Coffee Lake-S processors.

In their 24 January 2018 microcode revision guidance, they further added the Intel Xeon Scalable and Intel Xeon W processor families to the list of affected CPUs.

But there’s good news – on 8 February 2018, Intel confirmed that 80 CPU models previously marked as affected have been certified to be free from the buggy microcode updates.

On 12 February 2018, Intel released beta microcode updates for some of their Coffee LakeBroadwell and Haswell processors, and pre-beta updates for their Arrandale, Clarkdale and Gulftown processors.

On 20 February 2018, Intel released production microcode updates for their Coffee Lake, Kaby Lake and Skylake processors, with new beta microcode updates for their Haswell, Ivy Bridge and Sandy Bridge processors.

On 26 February 2018, Intel released production microcode updates for the remaining Broadwell and Haswell processors, except for their Broadwell EX and Haswell EX (server) processors.

On 1 March 2018, Intel released new beta microcode updates for their Arrandale, ClarkdaleGulftown, Nehalem EP, Nehalem WS, Westmere EP, Westmere WS and Ivy Bridge EX (server) processors. They also started releasing pre-beta updates for their Lynnfield and Westmere EX processors. With the release of the Skylake Xeon E3 production update, the entire Intel Skylake family is fully patched.

Intel is not the first to be beset by problems in the rush to patch Meltdown and Spectre. Microsoft recently admitted that some Windows 10 updates were bricking some AMD PCs.

 

The Root Cause – Intel Spectre 2 Patches

On 22 January 2018, Navin Shenoy announced that Intel :

  • has identified the root cause for Broadwell and Haswell platforms, and
  • is making good progress in developing a solution to address that root cause.

They revealed that the spontaneous reboot issues seen with the affected Intel CPUs were caused by Spectre 2 mitigations in those microcode updates.

Notably, Intel only confirmed that Spectre 2 mitigations were the root cause in those two platforms. They have not confirmed Spectre 2 mitigations as the cause in the Coffee LakeKaby Lake, Skylake, Ivy Bridge and Sandy Bridge platforms that are also affected.

In fact, Intel shared that “The progress we have made in identifying a root cause for Haswell and Broadwell will help us address issues on other platforms. Please be assured we are working quickly to address these issues.

 

What CPUs Are Affected By The Buggy Intel Spectre 2 Patches?

All of the systems suffering from spontaneous reboot issues were running on HaswellBroadwellSkylake, Kaby Lake and the latest Coffee Lake CPUs. Workstation and server CPUs based on Ivy Bridge and Sandy Bridge were also affected, but thankfully not their desktop brethren.

On 8 February 2018, Intel revealed that some of the microcode updates that they suspected were buggy, were actually not buggy. They include :

  • The Intel Skylake H/S/U/Y Desktop Processors
  • The Intel Xeon E3-1200 v5 Processor Family (Skylake)

We prepared the full list of CPUs affected by the buggy Intel Spectre 2 patches, but it is a VERY LONG LIST with 801 CPUs, so we split them into three sections.

As you can see, many more server and workstation CPUs are affected than desktop and mobile CPUs combined. That’s because Intel prioritised the patching of their server and workstation CPUs, over desktop and mobile CPUs.

 

What Is Being Done About The Buggy Intel Spectre 2 Patches?

When he first posted on the spontaneous reboot issue, Navin said that Intel was working to “understand, diagnose and address this reboot issue“.

In his latest update, he shared that Intel had already issued an early version of the new microcode updates to their partners for tests, and will release them “once that testing has been completed“.

These new microcode updates basically have Spectre 2 mitigations removed. This will restore stability to the affected Intel CPUs, while Intel fixes the problems in those mitigations.

 

The Intel Spectre Microcode Update Schedule Updated!

On 7 February 2018, Navin Shenoy announced that Intel has released “production microcode updates for several Skylake-based platforms” to their OEM customers and industry partners, with more platform updates “in coming days“.

The schedule was updated on 12, 20, 26 February and 1 March with more details, including production (final), pre-beta and beta versions of the new Intel Spectre microcode updates.

 

What Should YOU Do?

While Intel initially advised end-users to “apply updates” from system and operating system providers, they have now changed their guidance, as of 22 January 2018 :

  • We recommend that OEMs, Cloud service providers, system manufacturers, software vendors and end users stop deployment of current versions on the below platforms, as they may introduce higher than expected reboots and other unpredictable system behavior.
  • We also ask that our industry partners focus efforts on testing early versions of the updated solution for Broadwell and Haswell we started rolling out this weekend, so we can accelerate its release. We expect to share more details on timing later this week.
  • For those concerned about system stability while we finalize the updated solutions, we are also working with our OEM partners on the option to utilize a previous version of microcode that does not display these issues, but removes the Variant 2 (Spectre) mitigations. This would be delivered via a BIOS update, and would not impact mitigations for Variant 1 (Spectre) and Variant 3 (Meltdown).

Please note that there has been no actual recorded threat or attack using the Meltdown or Spectre exploits. The damage, or risk of damage, every time your system or server spontaneously reboot is FAR WORSE than the (currently) non-existent threat of a Meltdown or Spectre exploit.

Therefore, we recommend that you DO NOT apply any microcode update for your Intel system, if you are using any Intel processor manufactured since 2011.

If you have already applied the latest Intel Spectre microcode update, and are affected by spontaneous reboots; you should upgrade to the new firmware (if they are available), or revert to the older firmware.

 

Meltdown + Spectre Reading Suggestions

[adrotate group=”2″]

Next Page > Server / Workstation CPUs With Buggy Intel Spectre Patches

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Server / Workstation CPUs With Buggy Intel Spectre Patches

Intel Skylake-W (2017)

  • Intel Xeon W-2195
  • Intel Xeon W-2175
  • Intel Xeon W-2155
  • Intel Xeon W-2150B
  • Intel Xeon W-2145
  • Intel Xeon W-2140B
  • Intel Xeon W-2135
  • Intel Xeon W-2133
  • Intel Xeon W-2125
  • Intel Xeon W-2123
  • Intel Xeon W-2104
  • Intel Xeon W-2102

Intel Skylake-SP (2017)

  • Intel Xeon Platinum 8180
  • Intel Xeon Platinum 8180M
  • Intel Xeon Platinum 8176
  • Intel Xeon Platinum 8176F
  • Intel Xeon Platinum 8176M
  • Intel Xeon Platinum 8173M
  • Intel Xeon Platinum 8170
  • Intel Xeon Platinum 8170M
  • Intel Xeon Platinum 8168
  • Intel Xeon Platinum 8167M
  • Intel Xeon Platinum 8164
  • Intel Xeon Platinum 8163
  • Intel Xeon Platinum 8160
  • Intel Xeon Platinum 8160F
  • Intel Xeon Platinum 8160M
  • Intel Xeon Platinum 8160T
  • Intel Xeon Platinum 8158
  • Intel Xeon Platinum 8156
  • Intel Xeon Platinum 8153
  • Intel Xeon Gold 6161
  • Intel Xeon Gold 6154
  • Intel Xeon Gold 6152
  • Intel Xeon Gold 6150
  • Intel Xeon Gold 6149
  • Intel Xeon Gold 6148
  • Intel Xeon Gold 6148F
  • Intel Xeon Gold 6146
  • Intel Xeon Gold 6145
  • Intel Xeon Gold 6144
  • Intel Xeon Gold 6142
  • Intel Xeon Gold 6142F
  • Intel Xeon Gold 6142M
  • Intel Xeon Gold 6140
  • Intel Xeon Gold 6140M
  • Intel Xeon Gold 6138
  • Intel Xeon Gold 6138F
  • Intel Xeon Gold 6138T
  • Intel Xeon Gold 6136
  • Intel Xeon Gold 6134
  • Intel Xeon Gold 6134M
  • Intel Xeon Gold 6132
  • Intel Xeon Gold 6130
  • Intel Xeon Gold 6130F
  • Intel Xeon Gold 6130T
  • Intel Xeon Gold 6128
  • Intel Xeon Gold 6126
  • Intel Xeon Gold 6126F
  • Intel Xeon Gold 6126T
  • Intel Xeon Gold 6122
  • Intel Xeon Gold 6120
  • Intel Xeon Gold 6120T
  • Intel Xeon Gold 6119T
  • Intel Xeon Gold 6118
  • Intel Xeon Gold 6117
  • Intel Xeon Gold 6117F
  • Intel Xeon Gold 6115
  • Intel Xeon Silver 4116
  • Intel Xeon Silver 4116T
  • Intel Xeon Silver 4114
  • Intel Xeon Silver 4114T
  • Intel Xeon Silver 4112
  • Intel Xeon Silver 4110
  • Intel Xeon Silver 4109T
  • Intel Xeon Silver 4108
  • Intel Xeon Bronze 3106
  • Intel Xeon Bronze 3104

Intel Kaby Lake-DT (2017)

  • Intel Xeon E3-1285 v6
  • Intel Xeon E3-1280 v6
  • Intel Xeon E3-1275 v6
  • Intel Xeon E3-1270 v6
  • Intel Xeon E3-1245 v6
  • Intel Xeon E3-1240 v6
  • Intel Xeon E3-1230 v6
  • Intel Xeon E3-1225 v6
  • Intel Xeon E3-1220 v6

Intel Kaby Lake-H (2017)

  • Intel Xeon E3-1535M
  • Intel Xeon E3-1505M
  • Intel Xeon E3-1505L
  • Intel Xeon E3-1501L
  • Intel Xeon E3-1501M

Intel Skylake-H (2016)

  • Intel Xeon E3-1585 v5
  • Intel Xeon E3-1585L v5
  • Intel Xeon E3-1578L v5
  • Intel Xeon E3-1575M v5
  • Intel Xeon E3-1565L v5
  • Intel Xeon E3-1558L v5
  • Intel Xeon E3-1545M v5
  • Intel Xeon E3-1535M v5
  • Intel Xeon E3-1515M v5
  • Intel Xeon E3-1505M v5
  • Intel Xeon E3-1505L v5

Intel Broadwell-EX (2016)

  • Intel E7-8894 v4
  • Intel E7-8893 v4
  • Intel E7-8891 v4
  • Intel E7-8890 v4
  • Intel E7-8880 v4
  • Intel E7-8870 v4
  • Intel E7-8867 v4
  • Intel E7-8860 v4
  • Intel E7-8855 v4
  • Intel E7-4850 v4
  • Intel E7-4830 v4
  • Intel E7-4820 v4
  • Intel E7-4809 v4

Intel Broadwell-EP (2016)

  • Intel Xeon E5-4669 v4
  • Intel Xeon E5-4667 v4
  • Intel Xeon E5-4660 v4
  • Intel Xeon E5-4650 v4
  • Intel Xeon E5-4640 v4
  • Intel Xeon E5-4628L v4
  • Intel Xeon E5-4627 v4
  • Intel Xeon E5-4620 v4
  • Intel Xeon E5-4610 v4
  • Intel Xeon E5-2699 v4
  • Intel Xeon E5-2699A v4
  • Intel Xeon E5-2699C v4
  • Intel Xeon E5-2699P v4
  • Intel Xeon E5-2699R v4
  • Intel Xeon E5-2698 v4
  • Intel Xeon E5-2697 v4
  • Intel Xeon E5-2697A v4
  • Intel Xeon E5-2696 v4
  • Intel Xeon E5-2695 v4
  • Intel Xeon E5-2690 v4
  • Intel Xeon E5-2689 v4
  • Intel Xeon E5-2689A v4
  • Intel Xeon E5-2687W v4
  • Intel Xeon E5-2686 v4
  • Intel Xeon E5-2683 v4
  • Intel Xeon E5-2682 v4
  • Intel Xeon E5-2680 v4
  • Intel Xeon E5-2679 v4
  • Intel Xeon E5-2676 v4
  • Intel Xeon E5-2676 v4
  • Intel Xeon AWS-1100 v4
  • Intel Xeon E5-2667 v4
  • Intel Xeon E5-2666 v4
  • Intel Xeon E5-2660 v4
  • Intel Xeon E5-2658 v4
  • Intel Xeon E5-2650 v4
  • Intel Xeon E5-2650L v4
  • Intel Xeon E5-2648L v4
  • Intel Xeon E5-2643 v4
  • Intel Xeon E5-2640 v4
  • Intel Xeon E5-2637 v4
  • Intel Xeon E5-2630 v4
  • Intel Xeon E5-2630L v4
  • Intel Xeon E5-2628L v4
  • Intel Xeon E5-2623 v4
  • Intel Xeon E5-2620 v4
  • Intel Xeon E5-2618L v4
  • Intel Xeon E5-2609 v4
  • Intel Xeon E5-2608L v4
  • Intel Xeon E5-2607 v4
  • Intel Xeon E5-2603 v4
  • Intel Xeon E5-1680 v4
  • Intel Xeon E5-1660 v4
  • Intel Xeon E5-1650 v4
  • Intel Xeon E5-1630 v4
  • Intel Xeon E5-1620 v4
  • Intel Xeon E5-1607 v4
  • Intel Xeon E5-1603 v4

Intel Skylake-DT (2015)

  • Intel Xeon E5-1280 v5
  • Intel Xeon E5-1275 v5
  • Intel Xeon E5-1270 v5
  • Intel Xeon E5-1268L v5
  • Intel Xeon E5-1260L v5
  • Intel Xeon E5-1245 v5
  • Intel Xeon E5-1240 v5
  • Intel Xeon E5-1240L v5
  • Intel Xeon E5-1235L v5
  • Intel Xeon E5-1230 v5
  • Intel Xeon E5-1225 v5
  • Intel Xeon E5-1220 v5

Intel Broadwell-H (2015)

  • Intel Xeon E3-1285 v4
  • Intel Xeon E3-1285L v4
  • Intel Xeon E3-1284L v4
  • Intel Xeon E3-1278L v4
  • Intel Xeon E3-1270L v4
  • Intel Xeon E3-1265L v4
  • Intel Xeon E3-1258L v4

Intel Haswell-EX (2015)

  • Intel Xeon E7-8895 v3
  • Intel Xeon E7-8893 v3
  • Intel Xeon E7-8891 v3
  • Intel Xeon E7-8890 v3
  • Intel Xeon E7-8880 v3
  • Intel Xeon E7-8880L v3
  • Intel Xeon E7-8870 v3
  • Intel Xeon E7-8867 v3
  • Intel Xeon E7-8860 v3
  • Intel Xeon E7-4850 v3
  • Intel Xeon E7-4830 v3
  • Intel Xeon E7-4820 v3
  • Intel Xeon E7-4809 v3
[adrotate group=”1″]

Intel Haswell-EN (2015)

  • Intel Xeon E5-2438L v3
  • Intel Xeon E5-2428L v3
  • Intel Xeon E5-2418L v3
  • Intel Xeon E5-2408L v3
  • Intel Xeon E5-1428L v3

Intel Haswell-EP (2014)

  • Intel Xeon E5-4669 v3
  • Intel Xeon E5-4667 v3
  • Intel Xeon E5-4660 v3
  • Intel Xeon E5-4655 v3
  • Intel Xeon E5-4650 v3
  • Intel Xeon E5-4648 v3
  • Intel Xeon E5-4640 v3
  • Intel Xeon E5-4627 v3
  • Intel Xeon E5-4620 v3
  • Intel Xeon E5-4610 v3
  • Intel Xeon E5-2699 v3
  • Intel Xeon E5-2698 v3
  • Intel Xeon E5-2698A v3
  • Intel Xeon E5-2698B v3
  • Intel Xeon E5-2697 v3
  • Intel Xeon E5-2696 v3
  • Intel Xeon E5-2695 v3
  • Intel Xeon E5-2693 v3
  • Intel Xeon E5-2692 v3
  • Intel Xeon E5-2695 v3
  • Intel Xeon E5-2690 v3
  • Intel Xeon E5-2687W v3
  • Intel Xeon E5-2685 v3
  • Intel Xeon E5-2683 v3
  • Intel Xeon E5-2680 v3
  • Intel Xeon E5-2678 v3
  • Intel Xeon E5-2676 v3
  • Intel Xeon E5-2675 v3
  • Intel Xeon E5-2673 v3
  • Intel Xeon E5-2670 v3
  • Intel Xeon E5-2669 v3
  • Intel Xeon E5-2667 v3
  • Intel Xeon E5-2666 v3
  • Intel Xeon E5-2663 v3
  • Intel Xeon E5-2660 v3
  • Intel Xeon E5-2658 v3
  • Intel Xeon E5-2658A v3
  • Intel Xeon E5-2652 v3
  • Intel Xeon E5-2650 v3
  • Intel Xeon E5-2650L v3
  • Intel Xeon E5-2649 v3
  • Intel Xeon E5-2643 v3
  • Intel Xeon E5-2640 v3
  • Intel Xeon E5-2648L v3
  • Intel Xeon E5-2637 v3
  • Intel Xeon E5-2630 v3
  • Intel Xeon E5-2630L v3
  • Intel Xeon E5-2629 v3
  • Intel Xeon E5-2628 v3
  • Intel Xeon E5-2628L v3
  • Intel Xeon E5-2623 v3
  • Intel Xeon E5-2622 v3
  • Intel Xeon E5-2620 v3
  • Intel Xeon E5-2618L v3
  • Intel Xeon E5-2609 v3
  • Intel Xeon E5-2608L v3
  • Intel Xeon E5-2603 v3
  • Intel Xeon E5-1691 v3
  • Intel Xeon E5-1686 v3
  • Intel Xeon E5-1681 v3
  • Intel Xeon E5-1680 v3
  • Intel Xeon E5-1660 v3
  • Intel Xeon E5-1650 v3
  • Intel Xeon E5-1630 v3
  • Intel Xeon E5-1620 v3
  • Intel Xeon E5-1607 v3
  • Intel Xeon E5-1603 v3

Intel Ivy Bridge-EN (2014)

  • Intel Xeon E5-2470 v2
  • Intel Xeon E5-2450 v2
  • Intel Xeon E5-2450L v2
  • Intel Xeon E5-2448L v2
  • Intel Xeon E5-2440 v2
  • Intel Xeon E5-2430 v2
  • Intel Xeon E5-2430L v2
  • Intel Xeon E5-2428L v2
  • Intel Xeon E5-2420 v2
  • Intel Xeon E5-2418L v2
  • Intel Xeon E5-2407 v2
  • Intel Xeon E5-2403 v2
  • Intel Xeon E5-1428L v2
  • Intel Xeon E5-1410 v2

Intel Haswell-WS (2013)

  • Intel Xeon E3-1286 v3
  • Intel Xeon E3-1286L v3
  • Intel Xeon E3-1285 v3
  • Intel Xeon E3-1285L v3
  • Intel Xeon E3-1284L v3
  • Intel Xeon E3-1281 v3
  • Intel Xeon E3-1280 v3
  • Intel Xeon E3-1276 v3
  • Intel Xeon E3-1275 v3
  • Intel Xeon E3-1275L v3
  • Intel Xeon E3-1271 v3
  • Intel Xeon E3-1270 v3
  • Intel Xeon E3-1268L v3
  • Intel Xeon E3-1265L v3
  • Intel Xeon E3-1246 v3
  • Intel Xeon E3-1245 v3
  • Intel Xeon E3-1241 v3
  • Intel Xeon E3-1240 v3
  • Intel Xeon E3-1240L v3
  • Intel Xeon E3-1230L v3
  • Intel Xeon E3-1231 v3
  • Intel Xeon E3-1230 v3
  • Intel Xeon E3-1226 v3
  • Intel Xeon E3-1225 v3
  • Intel Xeon E3-1220 v3
  • Intel Xeon E3-1220L v3

Intel Ivy Bridge-EP (2013)

  • Intel Xeon E5-4657L v2
  • Intel Xeon E5-4650 v2
  • Intel Xeon E5-4640 v2
  • Intel Xeon E5-4627 v2
  • Intel Xeon E5-4624L v2
  • Intel Xeon E5-4620 v2
  • Intel Xeon E5-4610 v2
  • Intel Xeon E5-4607 v2
  • Intel Xeon E5-4603 v2
  • Intel Xeon E5-2697 v2
  • Intel Xeon E5-2696 v2
  • Intel Xeon E5-2695 v2
  • Intel Xeon E5-2692 v2
  • Intel Xeon E5-2690 v2
  • Intel Xeon E5-2687W v2
  • Intel Xeon E5-2680 v2
  • Intel Xeon E5-2673 v2
  • Intel Xeon E5-2670 v2
  • Intel Xeon E5-2667 v2
  • Intel Xeon E5-2660 v2
  • Intel Xeon E5-2658 v2
  • Intel Xeon E5-2651 v2
  • Intel Xeon E5-2650 v2
  • Intel Xeon E5-2650L v2
  • Intel Xeon E5-2648L v2
  • Intel Xeon E5-2643 v2
  • Intel Xeon E5-2640 v2
  • Intel Xeon E5-2637 v2
  • Intel Xeon E5-2630 v2
  • Intel Xeon E5-2630L v2
  • Intel Xeon E5-2628L v2
  • Intel Xeon E5-2620 v2
  • Intel Xeon E5-2618L v2
  • Intel Xeon E5-2609 v2
  • Intel Xeon E5-2603 v2
  • Intel Xeon E5-1680 v2
  • Intel Xeon E5-1660 v2
  • Intel Xeon E5-1650 v2
  • Intel Xeon E5-1620 v2
  • Intel Xeon E5-1607 v2
[adrotate group=”1″]

Next Page > Desktop CPUs With Buggy Intel Spectre Patches

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Desktop CPUs With Buggy Intel Spectre Patches

Intel Coffee Lake-S (2017)

  • Intel Core i7-8700K
  • Intel Core i7-8700
  • Intel Core i5-8600K
  • Intel Core i5-8400
  • Intel Core i3-8350K
  • Intel Core i3-8100

Intel Kaby Lake-X (2017)

  • Intel Core i7-7740X
  • Intel Core i5-7640X

Intel Kaby Lake-S (2017)

  • Intel Core i7-7700K
  • Intel Core i7-7700
  • Intel Core i7-7700T
  • Intel Core i5-7600K
  • Intel Core i5-7600
  • Intel Core i5-7600T
  • Intel Core i5-7500
  • Intel Core i5-7500T
  • Intel Core i5-7400
  • Intel Core i5-7400T
  • Intel Core i3-7350K
  • Intel Core i3-7320
  • Intel Core i3-7300
  • Intel Core i3-7300T
  • Intel Core i3-7101T
  • Intel Core i3-7101TE
  • Intel Core i3-7100
  • Intel Core i3-7100T
  • Intel Pentium G4620
  • Intel Pentium G4600
  • Intel Pentium G4600T
  • Intel Pentium G4560
  • Intel Pentium G4560T
  • Intel Celeron G3950
  • Intel Celeron G3930
  • Intel Celeron G3930T
  • Intel Celeron G3930E
  • Intel Celeron G3930TE

Intel Skylake-X (2017)

  • Intel Core i9-7980XE
  • Intel Core i9-7960X
  • Intel Core i9-7940X
  • Intel Core i9-7920X
  • Intel Core i9-7900X
  • Intel Core i7-7820X
  • Intel Core i7-7800X

Intel Broadwell-E (2016)

  • Intel Core i7-6950X
  • Intel Core i7-6900K
  • Intel Core i7-6850X
  • Intel Core i7-6800X
[adrotate group=”1″]

Intel Broadwell-H (2015)

  • Intel Core i7-5775C
  • Intel Core i7-5775R
  • Intel Core i5-5675R
  • Intel Core i5-5675C
  • Intel Core i5-5575R

Intel Haswell-E (2014)

  • Intel Core i7-5960X
  • Intel Core i7-5930K
  • Intel Core i7-5820K

Intel Haswell-H (2013)

  • Intel Core i7-4770R
  • Intel Core i5-4670R
  • Intel Core i5-4570R

Intel Haswell-DT (2013)

  • Intel Core i7-4790K
  • Intel Core i7-4790
  • Intel Core i7-4790S
  • Intel Core i7-4790T
  • Intel Core i7-4785T
  • Intel Core i7-4771
  • Intel Core i7-4770K
  • Intel Core i7-4770
  • Intel Core i7-4770S
  • Intel Core i7-4770T
  • Intel Core i7-4770TE
  • Intel Core i7-4765T
  • Intel Core i5-4690K
  • Intel Core i5-4690
  • Intel Core i5-4690S
  • Intel Core i5-4690T
  • Intel Core i5-4670K
  • Intel Core i5-4670
  • Intel Core i5-4670S
  • Intel Core i5-4670T
  • Intel Core i5-4590
  • Intel Core i5-4590S
  • Intel Core i5-4590T
  • Intel Core i5-4570
  • Intel Core i5-4570S
  • Intel Core i5-4570T
  • Intel Core i5-4570TE
  • Intel Core i5-4460
  • Intel Core i5-4460S
  • Intel Core i5-4460T
  • Intel Core i5-4440
  • Intel Core i5-4440S
  • Intel Core i5-4430
  • Intel Core i5-4430S
  • Intel Core i3-4370
  • Intel Core i3-4370T
  • Intel Core i3-4360
  • Intel Core i3-4360T
  • Intel Core i3-4350
  • Intel Core i3-4350T
  • Intel Core i3-4340
  • Intel Core i3-4340TE
  • Intel Core i3-4330
  • Intel Core i3-4330T
  • Intel Core i3-4330TE
  • Intel Core i3-4170
  • Intel Core i3-4170T
  • Intel Core i3-4160
  • Intel Core i3-4160T
  • Intel Core i3-4150
  • Intel Core i3-4150T
  • Intel Core i3-4130
  • Intel Core i3-4130T
  • Intel Pentium G3470
  • Intel Pentium G3460
  • Intel Pentium G3460T
  • Intel Pentium G3450
  • Intel Pentium G3450T
  • Intel Pentium G3440
  • Intel Pentium G3440T
  • Intel Pentium G3430
  • Intel Pentium G3420
  • Intel Pentium G3420T
  • Intel Pentium G3320TE
  • Intel Pentium G3260
  • Intel Pentium G3260T
  • Intel Pentium G3258
  • Intel Pentium G3250
  • Intel Pentium G3250T
  • Intel Pentium G3240
  • Intel Pentium G3240T
  • Intel Pentium G3220
  • Intel Pentium G3220T
  • Intel Celeron G1850
  • Intel Celeron G1840
  • Intel Celeron G1840T
  • Intel Celeron G1830
  • Intel Celeron G1820
  • Intel Celeron G1820T
  • Intel Celeron G1820TE
[adrotate group=”1″]

Next Page > Mobile CPUs With Buggy Intel Spectre Patches

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Mobile CPUs With Buggy Intel Spectre Patches

Intel Kaby Lake Refresh (2017)

  • Intel Core i7-8650U
  • Intel Core i7-8550U
  • Intel Core i5-8350U
  • Intel Core i5-8250U

Intel Kaby Lake-Y (2017)

  • Intel Core i5-Y757
  • Intel Core i5-Y754
  • Intel Core m3-7Y32
  • Intel Core m3-7Y30
  • Intel Pentium 4415Y
  • Intel Pentium 4410Y
  • Intel Celeron 3965Y

Intel Kaby Lake-U (2017)

  • Intel Core i7-7660U
  • Intel Core i7-7600U
  • Intel Core i7-7567U
  • Intel Core i7-7560U
  • Intel Core i7-7500U
  • Intel Core i5-7360U
  • Intel Core i5-7300U
  • Intel Core i5-7287U
  • Intel Core i5-7367U
  • Intel Core i5-7260U
  • Intel Core i5-7200U
  • Intel Core i3-7167U
  • Intel Core i3-7130U
  • Intel Core i3-7100U
  • Intel Pentium 4415U
  • Intel Celeron 3965U
  • Intel Celeron 3865U

Intel Kaby Lake-H (2016)

  • Intel Core i7-7920HQ
  • Intel Core i7-7820HQ
  • Intel Core i7-7820HK
  • Intel Core i7-7820EQ
  • Intel Core i7-7700HQ
  • Intel Core i7-7Y75
  • Intel Core i5-7442HQ
  • Intel Core i5-7442EQ
  • Intel Core i5-7440HQ
  • Intel Core i5-7440EQ
  • Intel Core i3-7102E
  • Intel Core i3-7100H
  • Intel Core i3-7100E

Intel Broadwell-H (2015)

  • Intel Core i7-5950HQ
  • Intel Core i7-5850HQ
  • Intel Core i7-5850EQ
  • Intel Core i7-5750HQ
  • Intel Core i7-5700HQ
  • Intel Core i7-5700EQ
  • Intel Core i5-5350H

Intel Broadwell-U (2015)

  • Intel Core i7-5650U
  • Intel Core i7-5600U
  • Intel Core i7-5557U
  • Intel Core i7-5550U
  • Intel Core i7-5500U
  • Intel Core i5-5350U
  • Intel Core i5-5300U
  • Intel Core i5-5287U
  • Intel Core i5-5257U
  • Intel Core i5-5250U
  • Intel Core i5-5200U
  • Intel Core i3-5157U
  • Intel Core i3-5020U
  • Intel Core i3-5015U
  • Intel Core i3-5010U
  • Intel Core i3-5005U
  • Intel Pentium 3825U
  • Intel Pentium 3805U
  • Intel Celeron 3765U
  • Intel Celeron 3755U
  • Intel Celeron 3215U
  • Intel Celeron 3205U
[adrotate group=”1″]

Intel Broadwell-Y (2014)

  • Intel Core M-5Y71
  • Intel Core M-5Y70
  • Intel Core M-5Y51
  • Intel Core M-5Y31
  • Intel Core M-5Y10c
  • Intel Core M-5Y10a
  • Intel Core M-5Y10

Intel Haswell-H (2013)

  • Intel Core i7-4980HQ
  • Intel Core i7-4960HQ
  • Intel Core i7-4950HQ
  • Intel Core i7-4870HQ
  • Intel Core i7-4860HQ
  • Intel Core i7-4860EQ
  • Intel Core i7-4850HQ
  • Intel Core i7-4850EQ
  • Intel Core i7-4770HQ
  • Intel Core i7-4760HQ
  • Intel Core i7-4750HQ
  • Intel Core i7-4722HQ
  • Intel Core i7-4720HQ
  • Intel Core i7-4712HQ
  • Intel Core i7-4710HQ
  • Intel Core i7-4702HQ
  • Intel Core i7-4702EC
  • Intel Core i7-4701EQ
  • Intel Core i7-4700HQ
  • Intel Core i7-4700MQ
  • Intel Core i7-4700EQ
  • Intel Core i7-4700EC
  • Intel Core i5-4422E
  • Intel Core i5-4410E
  • Intel Core i5-4402E
  • Intel Core i5-4402EC
  • Intel Core i5-4400E
  • Intel Core i5-4210H
  • Intel Core i5-4200H
  • Intel Core i3-4112E
  • Intel Core i3-4110E
  • Intel Core i3-4102E
  • Intel Core i3-4100E

Intel Haswell-ULX (2013)

  • Intel Core i7-4610Y
  • Intel Core i5-4302Y
  • Intel Core i5-4300Y
  • Intel Core i5-4220Y
  • Intel Core i5-4210Y
  • Intel Core i5-4202Y
  • Intel Core i3-4030Y
  • Intel Core i3-4020Y
  • Intel Core i3-4012Y
  • Intel Core i3-4010Y
  • Intel Pentium 3561Y
  • Intel Pentium 3560Y
  • Intel Celeron 2002E
  • Intel Celeron 2000E

Intel Haswell-ULX (2013)

  • Intel Celeron 2961Y

Intel Haswell-ULT (2013)

  • Intel Core i7-4650U
  • Intel Core i7-4600U
  • Intel Core i7-4578U
  • Intel Core i7-4558U
  • Intel Core i7-4550U
  • Intel Core i7-4510U
  • Intel Core i7-4500U
  • Intel Core i5-4360U
  • Intel Core i5-4360U
  • Intel Core i5-4310U
  • Intel Core i5-4308U
  • Intel Core i5-4300U
  • Intel Core i5-4288U
  • Intel Core i5-4280U
  • Intel Core i5-4278U
  • Intel Core i5-4258U
  • Intel Core i5-4250U
  • Intel Core i5-4210U
  • Intel Core i5-4200U
  • Intel Core i3-4158U
  • Intel Core i3-4120U
  • Intel Core i3-4100U
  • Intel Core i3-4030U
  • Intel Core i3-4025U
  • Intel Core i3-4010U
  • Intel Core i3-4005U
  • Intel Pentium 3558U
  • Intel Pentium 3556U
  • Intel Celeron 2981U
  • Intel Celeron 2980U
  • Intel Celeron 2957U
  • Intel Celeron 2955U

Intel Haswell-MB (2013)

  • Intel Core i7-4940MX
  • Intel Core i7-4930MX
  • Intel Core i7-4910MQ
  • Intel Core i7-4900MQ
  • Intel Core i7-4810MQ
  • Intel Core i7-4800MQ
  • Intel Core i7-4712MQ
  • Intel Core i7-4710MQ
  • Intel Core i7-4702MQ
  • Intel Core i7-4610M
  • Intel Core i7-4600M
  • Intel Core i5-4340M
  • Intel Core i5-4330M
  • Intel Core i5-4310M
  • Intel Core i5-4300M
  • Intel Core i5-4210M
  • Intel Core i5-4200M
  • Intel Core i3-4110M
  • Intel Core i3-4100M
  • Intel Core i3-4010M
  • Intel Core i3-4000M
  • Intel Pentium 3560M
  • Intel Pentium 3550M
  • Intel Celeron 2970M
  • Intel Celeron 2950M

 

Meltdown + Spectre Reading Suggestions

[adrotate group=”2″]

Go Back To > First Page | Articles | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

The Samsung Galaxy S9 Camera Features Explained!

The Samsung Galaxy S9 and Samsung Galaxy S9+ boast improved cameras with a bunch of new features. In this article, we will explain to you the new Galaxy S9 camera features, and share with you a live demonstration video and samples of the new Super Slow-mo feature!

 

The Samsung Galaxy S9 Camera Features Explained!

Samsung conducted a special tech briefing session on the Samsung Galaxy S9 camera features. They demonstrated the new Galaxy S9 camera features like Super Slow-mo, f/1.5 low light capability, and the new AR Emoji feature.

Dual Aperture Camera

Both models feature a new, unique dual aperture camera. The camera has a mechanical aperture that automatically switches between an incredibly bright f/1.5 aperture, and the f/2.4 aperture for a deeper depth of field.

The f/1.5 aperture is the widest aperture so far in a smartphone, offering just over ⅓ stop more light than the f/1.7 aperture of the Samsung Galaxy S8‘s camera. This translates into better low-light photography with less noise.

Super Slow-Mo

Both smartphones will come with a new Super Slow-mo feature. It allows you to record slow-motion 720p video at 960 fps. Best of all – the Samsung Galaxy S9 and S9+ smartphones can automatically detect motion and start recording  when you need it to.

There are some caveats though. It is limited to 20 shots per video, with approximately 0.2 seconds of recording and 6 seconds of playback for each slow-mo shot.

The Super Slow-mo videos can be instantly edited, with a random selection from preloaded choices. Or you can use your own music / songs. You can also create a GIF from the recorded video, with three style of looping – reverse, forward or swing.

[adrotate group=”1″]

AR Emoji

This is arguably one of the coolest software features in the new Samsung Galaxy S9 camera system. You can use either the front or rear camera to take a picture of anyone, to create augmented reality emojis that look like your subject!

The Samsung Galaxy S9 and S9+ will automatically create an avatar that looks like you, which you can customise to your satisfaction. They will also automatically create 18 stickers showing a range of different emotions for you to use in your instant messages.

But that’s not all – the avatar will imitate your facial expressions. You can even record videos that can be shared with your friends!

Go Back To > Articles | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

The Samsung Galaxy S9 – Everything You Need To Know!

Samsung just revealed the Samsung Galaxy S9 and Galaxy S9+ at the 2018 Mobile World Congress! Here are their key features, prices, specifications, pictures, price and availability!

Article Update History

Check out what was updated recently!

Updated @ 2018-02-26 : Updated details of its dual aperture camera, ISOCELL Fast sensor, price and availability. Also added a new section on the Enterprise Edition.

Updated @ 2018-02-20 : Updated the specifications and features of the Galaxy S9/S9+. Added new sections on the colour options, and the Samsung DeX Pad.

Updated @ 2018-01-31 : Updated details on their Variable Aperture camera. Added new sections on IntelligentScan and their new ISOCELL Fast sensor. Also posted their launch prices.

Updated @ 2018-01-20 : Added a video, as well as details on their launch details, model numbers and battery capacities.

Updated @ 2018-01-15 : Added details of the new variable aperture camera, and the Super Slow-mo feature. Also updated their specifications.

Originally posted @ 2018-01-12

 

The Samsung Galaxy S9 / S9+ Revealed!

Like the Samsung Galaxy S8, there will be two sizes – the Galaxy S9 (SM-960) with a 5.8″ display, and the larger Galaxy S9+ (SM-965) with a 6.2″ display.

The US and Chinese models will be powered by the Qualcomm Snapdragon 845 SoC, while the rest of the world will receive the Samsung Exynos 9810 SoC instead.

This year though, Samsung will increase the feature differentiation between the two sizes. Let’s take a look…

Memory & Storage

The Samsung Galaxy S9+ will come with 6 GB of LPDDR4x memory, with 64 GB, 128 GB and 256 GB storage options, as well as a possible 512 GB model for “select markets” on a “temporary” basis.

The Samsung Galaxy S9 will only come with 4 GB of LPDDR4x memory, and either 64 GB or 128 GB of storage.

New Dual Aperture Camera Updated!

Both models will feature a new, unique dual aperture camera. It was first used in the rare and expensive Samsung W2018 smartphone (available only in China). The camera has a mechanical aperture that lets you switch between an incredibly bright f/1.5 aperture, and the f/2.4 aperture for a deeper depth of field.

For the first time as well, Samsung will also differentiate the two sizes by offering a dual camera setup like the Galaxy Note8 only in the Galaxy S9+. The second 12 MP camera (with a fixed f/2.4 aperture) adds Live Focus and Dual Capture capability to the Plus model, as well as the ability to switch lenses on-the-fly while recording videos.

The smaller Galaxy S9 will not support the Live Focus and Dual Capture capability we love so much in the Galaxy Note8. This would make the Galaxy S9+ a more enticing model for mobile photography enthusiasts.

New Samsung ISOCELL Fast Sensor Updated!

Samsung will also introduce their latest ISOCELL Fast S5K2L7/9 sensor in the new cameras. This is a 12 MP sensor with large 1.4 µm pixels for excellent low-light performance.

The Fast designation means it comes with its Dual Pixel and Super PD capabilities. It also boasts a 3-stack FRS (Fast Readout Sensor) that allows high-speed captures of Full HD video.

Super Slow-Mo Updated!

Both smartphones will come with a new Super Slow-mo feature. It allows you to record slow-motion 1080p video at 960 fps / 4K video at 120 fps. However, this feature is apparently limited to models using the Samsung Exynos 9810 SoC.

IntelligentScan

Instead of using a point cloud facial recognition system like Apple Face ID, and future honor smartphones, the Samsung Galaxy S9 will feature IntelligentScan. It combines the existing facial recognition and iris scanning capabilities to improve accuracy and security, even in low light or super bright conditions.

Fingerprint Sensor

The position of the fingerprint sensor was, finally, brought into central alignment. This makes it easier to use, especially in the Galaxy S9+ because the dual camera setup means the fingerprint sensor is positioned even lower.

The fingerprint sensor’s close proximity to the main camera though means you are still very likely to smudge the lens with your oily fingers.

Bixby & Earphone Port

[adrotate group=”2″]

Despite rumours that Samsung will be ditching the dedicated Bixby button and 3.5 mm earphone port, they will definitely be part of both devices.

Same Batteries

Both devices will come with the same battery capacities of their predecessors – 3000 mAh for the Samsung Galaxy S9, and 3,500 mAh for the larger Galaxy S9+.

However, they should have a longer battery life, thanks to their more efficient processors. They will also support the new 15 W fast wireless charging capability.

AKG-Tuned Stereo Speakers

The two new Samsung flagship smartphones will feature stereo speakers tuned by AKG.

Don’t forget to click to the next page to check out the specifications and launch details of the Samsung Galaxy S9 and S9+!

 

Enterprise Edition New!

Samsung will also be offering an Enterprise Edition of both devices. These are basically specially-configured Galaxy S9 or Galaxy S9+ smartphones for corporate clients.

You can read more about the Enterprise Edition devices in our article – The Samsung Galaxy S9 Enterprise Edition Details Leaked!

Next Page > DeX Pad, Colour Options, Specifications, Price & Availability

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Samsung DeX Pad

Samsung will be introducing a new DeX docking station called the Samsung DeX Pad. It will have a flat design, which allows the display to be used as a touch pad. It also lets you make use of the Galaxy S9’s earphone port.

You can read more about the new DeX Pad in our article – Details of the Samsung DeX Pad Leaked!

 

The Samsung Galaxy S9 Colour Options

The Samsung Galaxy S9 / S9+ will be available with four colour options – Midnight Black, Lilac Purple, Coral Blue, Titanium Silver. Here are three of them, as provided by Evan Blass.

 

Samsung Galaxy S9 / S9+ Specifications

Here are the specifications of the Samsung Galaxy S9 and S9+ smartphones that we managed to obtain.

SpecificationsSamsung Galaxy S9+Samsung Galaxy S9
ModelSM-965SM-960
Display6.2" Super AMOLED Infinity Display
- 1440 x 2960 pixels (529 ppi)
5.8" Super AMOLED Infinity Display
- 1440 x 2960 pixels (570 ppi)
Operating SystemAndroid 8.0Android 8.0
System PlatformQualcomm Snapdragon 845 (US)
Samsung Exynos 9810 (Worldwide)
Qualcomm Snapdragon 845 (US)
Samsung Exynos 9810 (Worldwide)
ProcessorQualcomm Snapdragon 845
- 8 x Qualcomm Kyro 385 (2.8 GHz)

Samsung Exynos 9810
- 4 x Custom CPU core (2.9 GHz)
- 4 x ARM Cortex-A55 (1.9 GHz)
Qualcomm Snapdragon 845
- 8 x Qualcomm Kyro 385 (2.8 GHz)

Samsung Exynos 9810
- 4 x Custom CPU core (2.9 GHz)
- 4 x ARM Cortex-A55 (1.9 GHz)
Graphics ProcessorQualcomm Snapdragon 845
- Qualcomm Adreno 630

Samsung Exynos 9810
- ARM Mali-G72 MP18
Qualcomm Snapdragon 845
- Qualcomm Adreno 630

Samsung Exynos 9810
- ARM Mali-G72 MP18
Memory6 GB LPDDR4x SDRAM4 GB LPDDR4x SDRAM
Storage64 / 128 / 256 GB internal flash storage
microSD card slot (up to 256 GB)
64 GB internal flash storage
microSD card slot (up to 256 GB)
Front Camera8 MP sensor8 MP sensor
Main CameraDual Camera System
- Main Dual Aperture Camera with 12 MP Dual Pixel sensor, OIS lens with f/1.5 and f/2.4 variable apertures
- Telephoto camera with 12 MP Dual Pixel sensor, OIS lens and f/2.4 aperture
- dual-tone LED flash
Dual Aperture Camera
- 12 MP Dual Pixel sensor with 1.4 μm pixels
- OIS lens with f/1.5 and f/2.4 variable apertures
- dual-tone LED flash
Super Slow-moYes, 720p (0.2 seconds)Yes, 720p (0.2 seconds)
Samsung Live FocusYesNo
ConnectivityQualcomm Snapdragon 845
- LTE Cat18 : 1.2Gbps DL / 150 Mbps UL
- WiFi : 802.11ac (2x2)
- USB Type C

Samsung Exynos 9810
- LTE Cat18 : 1.2Gbps DL / 200 Mbps UL
- WiFi : 802.11ac (2x2)
- USB Type C
Qualcomm Snapdragon 845
- LTE Cat18 : 1.2Gbps DL / 150 Mbps UL
- WiFi : 802.11ac (2x2)
- USB Type C

Samsung Exynos 9810
- LTE Cat18 : 1.2Gbps DL / 200 Mbps UL
- WiFi : 802.11ac (2x2)
- USB Type C
Iris ScannerYes, with IntelligentScan capabilityYes, with IntelligentScan capability
Fingerprint SensorYes, Rear-MountedYes, Rear-Mounted
Bixby ButtonYesYes
Dust & Water ResistanceIP68IP68
AudioAKG-tuned Stereo Speakers
3.5 mm audio jack
AKG-tuned Stereo Speakers
3.5 mm audio jack
FM RadioYesYes
Battery3,500 mAh lithium-ion battery
15 W Fast Wireless Charging Capability
3,000 mAh lithium-ion battery
15 W Fast Wireless Charging Capability
Dimensions73.8 mm wide
158.1 mm tall
8.5 mm thick
68.7 mm wide
147.7 mm tall
8.5 mm thick
Weight189 g163 g
Available ColoursMidnight Black / Coral Blue / Lilac Purple / Titanium SilverMidnight Black / Coral Blue / Lilac Purple / Titanium Silver

 

Samsung Galaxy S9 / S9+ Price & Availability Updated!

Here is the timeline for the launch and availability of these new Samsung flagship smartphones :

[adrotate group=”2″]

Samsung Galaxy S9 Unpacked launch event : Sunday, 25 February 2018
Pre-Order
begins : Friday, 2 March 2018
Delivery
begins : Friday, 16 March 2018

Here are the reported launch prices :

Samsung Galaxy S9 : KRW 950,000 / US$ 719.99 / £ 739
Samsung Galaxy S9+ : KRW 990,000 / US$ 839.99 / £ 869

Don’t forget to click to the next page to check out the many leaked pictures of the Samsung Galaxy S9 and S9+!

Next Page > Leaked Pictures of the Samsung Galaxy S9 and Galaxy S9+

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

The Most Credible Leaked Pictures

There are many “leaked pictures” on the Internet, but these are the most credible photos we found. They all tie in with what we know so far about the upcoming Samsung Galaxy S9 and S9+ smartphones. Check them out!

The Olixar Cases

These cases were leaked by Olixar. The clear case designs, in particular, offer the clearest look at the two Samsung smartphones.

Pictures Leaked From China

[adrotate group=”1″]

Box Sleeve Leaked From Vietnam

This picture of the outer sleeve for the Samsung Galaxy S9‘s box, which was purportedly leaked from Vietnam. It seems to be genuine, with the specifications matching what we know so far. Notably, it confirms the variable aperture camera, and the Super Slow-mo feature.

Go Back To > First PageArticles | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

The Samsung Galaxy S9 Enterprise Edition Details Leaked!

We had earlier revealed everything you need to know about the Samsung Galaxy S9 and Samsung Galaxy S9+ ahead of the official Galaxy UNPACKED event in Barcelona. Now, we will share with you details and the official Samsung video for the Samsung Galaxy S9 Enterprise Edition and the Samsung Galaxy S9+ Enterprise Edition smartphones.

 

The Samsung Galaxy S9 Enterprise Edition

As part of the Samsung For Enterprise (SAFE) initiative, many Samsung smartphones have the enterprise-grade encryption capabilities in the form of Samsung Knox built-in. This allows users to securely protect sensitive data using My Knox and now, Secure Folder.

Samsung appears to be extending their Knox capabilities to introduce Enterprise Edition versions of the Galaxy S9 and Galaxy S9+ smartphones. Check out the Samsung Galaxy S9 Enterprise Edition video that was just leaked.

In addition to Samsung Knox 3.1 and biometric authentication in the standard Galaxy S9 and Galaxy S9+ smartphones, the Samsung Galaxy S9 Enterprise Edition and Samsung Galaxy S9+ Enterprise Edition will feature :

[adrotate group=”2″]
  • Knox Configure
  • 24/7 technical support
  • Samsung E-FOTA (Firmware Over-The-Air) updates by the corporate IT department
  • Maintenance support, and extended device warranties
  • Security updates for up to 4 years

The video also confirmed the new Samsung DeX with a flat design, and gave us a first look at how the variable aperture camera works.

The variable aperture camera has a mechanical aperture that lets you switch between an incredibly bright f/1.5 aperture, and the f/2.4 aperture for a deeper depth of field.

You can read more about this and other Samsung Galaxy S9 features in our article, The Samsung Galaxy S9 – Everything You Need To Know!

Go Back To > Articles | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

The Intel Cannon Lake Processor Details Leaked!

During our continuing coverage of Meltdown and Spectre, we noticed that Intel accidentally leaked details of their upcoming 10 nm Cannon Lake processors. Let’s take a look at what we found!

 

The Intel Cannon Lake Processor

Cannon Lake is the long-delayed 10 nm die shrink of the Intel Kaby Lake microarchitecture. Originally slated for release in 2016, Intel delayed it in favour of another 14 nm process refinement with the Intel Coffee Lake processors.

In addition to a die shrink that would allow it to deliver better performance with lower power consumption and thermal output, the Cannon Lake processors will also boast the AVX-512 instruction set.

At CES 2018, Intel announced that they have already started shipping mobile Cannon Lake processors to their partners, with a production ramp-up in 2018. So we know for sure Cannon Lake will finally see the light of day in 2018.

 

What Intel Leaked On Cannon Lake

In their second Spectre 2 microcode update schedule, Intel accidentally released references to two Cannon Lake-U (CNL-U) processors.

The shorthand numbers appear to indicate that :

[adrotate group=”2″]
  • they are ultra-low power mobile processors, with a 15 W TDP
  • the (2+2) model is a dual-core processor with an Intel GT2 integrated graphics
  • the (2+0) model is a dual-core processor without integrated graphics

The (2+0) model is interesting because it’s the first U-grade Intel mobile processor to not come with integrated graphics.

Is this meant to be used in applications that do not require displays, like a NAS? Could it possibly be used in an MCM package with Radeon Graphics? Or is this a higher-performance part to be paired with discrete graphics options from AMD or NVIDIA?

 

Cannon Lake Availability

Intel was not specific about when exactly they will launch these mobile Cannon Lake processors, but we can glean some details from their leaked microcode update schedule.

We can see that the Cannon Lake BIOS is currently in beta testing. So a Q1 launch is unlikely, but a Q2 launch is most definitely on the table. In fact, we think that its launch got delayed after the Intel Spectre 2 reboot issue.

Intel probably delayed its official launch until they can make sure they have a fully-patched BIOS. It wouldn’t be good PR to launch the Cannon Lake processors, without being able to claim that they’re fully-protected against Meltdown and Spectre.

 

They’re Vulnerable To Meltdown + Spectre?

Yes, the Cannon Lake processors are all vulnerable to Meltdown and Spectre. These processors were taped out long ago. It was the Intel 10 nm process technology that was not sufficiently mature, not the Cannon Lake design.

Only the next-generation Intel Ice Lake processors, which features a new microarchitecture, will no longer be vulnerable to Meltdown and Spectre.

 

Suggested Reading

Go Back To > Articles | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Everything On The Meltdown + Spectre CPU Flaws! Rev. 3.0

The Meltdown and Spectre CPU flaws that the Google Project Zero team discovered are arguably the worst we have ever known. These vulnerabilities were built into BILLIONS of CPUs that we have been using for the last decade or so.

Not just Intel CPUs, but also CPUs made by AMD, Apple and ARM. Even those that power our smartphones and other smart devices!

Let’s take a look at what we know so far about Meltdown and Spectre, how they affect you, and what we can do about them.

This story is still developing. We will update the article as and when new details emerge. Be sure to check back and refresh the page for the latest information!

 

Article Update History

Click here for the Article Update History

2018-02-17 : Updated the table of CPUs vulnerable to Meltdown and Spectre. Updated four sections with new information.

2018-02-05 : Added a table of CPUs vulnerable to Meltdown and Spectre. Updated three sections with new information.

2018-01-25 : Revamped the entire article. Added a new section on the difference between Meltdown and Spectre, and a new section on InSpectre. Updated the list of vulnerable processors, mitigation efforts by Microsoft and Apple, as well as the Intel spontaneous reboot issues with their Spectre 2 patches.

2018-01-16 : Updated the list of vulnerable processors, and added a new section on Intel CPUs spontaneously rebooting after applying Meltdown and Spectre patches. Also added cautionary advice on holding off these updates.

2018-01-12 : Updated the article with the AMD confirmation that their processors are vulnerable to both Spectre exploits. Also added details on the Google Retpoline mitigation technique against Spectre attacks.

2018-01-11 : Added new sections on the performance impact of the Meltdown and Spectre mitigation patches, and reports of those patches bricking some AMD PCs. Also expanded the list of affected CPUs, and corrected information on the Intel-SA-00086 Detection Tool.

Between 2018-01-09 and 2018-01-10 : Numerous updates including details of patches and affected CPUs.

Originally posted @ 2018-01-09

 

The Meltdown + Spectre Vulnerabilities

  • The Project Zero team identified these vulnerabilities in 2017, reporting it to Intel, AMD and ARM on 1 June 2017.
  • These vulnerabilities take advantage of the Speculative Execution and Branch Prediction features of the modern processor, that have been used for many years to improve performance.
  • Speculative Execution lets the CPU predict and pre-execute the next instruction, allowing it to “instantly” deliver the results if it’s correct.
  • Branch Prediction helps the CPU predict future execution paths that should be speculatively-executed for better performance.
  • There are THREE (3) variants of the speculative execution CPU bug :
    • Variant 1 : Bounds Check Bypass (CVE-2017-5753)
    • Variant 2 : Branch Target Injection (CVE-2017-5715)
    • Variant 3 : Rogue Data Cache Load (CVE-2017-5754)
  • The Spectre attack (whitepaper) exploits variants 1 and 2.
  • The Meltdown attack (whitepaper) exploits variant 3.
  • There is a Variant 3a, which appears to affect only certain ARM processors.

 

What’s The Difference Between Meltdown & Spectre?

  • Spectre tricks the CPU branch predictor into mis-predicting the wrong path, thereby speculatively executing code that would not otherwise be executed.
  • Meltdown takes advantage of the out-of-order execution capability of modern processors, tricking them into executing malicious code that would normally not be allowed.
  • The Spectre name is based on both the root cause – speculative execution, and the fact that it is not easy to fix, and will haunt us for a long time like a spectre (ghost).
  • The Meltdown name was chosen because the vulnerability “basically melts security boundaries which are normally enforced by the hardware“.

 

How Bad Are Meltdown & Spectre?

  • The Spectre exploits let an attacker access and copy information from the memory space used by other applications.
  • The Meltdown exploit lets an attacker copy the entire physical memory of the computer.
  • Unless patched, the affected processors are vulnerable to malware and cyberattacks that exploits this CPU bug to steal critical information from running apps (like login and credit card information, emails, photos, documents, etc.)
  • While the Meltdown exploit can be “fixed”, it is likely that the Spectre exploit cannot be fixed, only mitigated, without a redesign of the processors. That means we will have to live with the risks of a Spectre attack for many more years to come.

 

How Many Processors Are Affected? Updated!

For the complete list of affected AMD, Apple, ARM and Intel processors, please see this separate article – The Complete List Of CPUs Vulnerable To Meltdown / Spectre

Company Spectre 1 Spectre 2 Meltdown
AMD 295 Server CPUs
42 Workstation CPUs
396 Desktop CPUs
208 Mobile CPUs
295 Server CPUs
42 Workstation CPUs
396 Desktop CPUs
208 Mobile CPUs
None
Apple 13 Mobile SoCs 13 Mobile SoCs 13 Mobile SoCs
ARM 10 Mobile CPUs
3 Server SoCs
10 Mobile CPUs
3 Server SoCs
4 Mobile CPUs
3 Server SoCs
IBM 10 POWER CPUs 10 POWER CPUs 10 POWER CPUs
Intel 732 Server / Workstation CPUs
443 Desktop CPUs
583 Mobile CPUs
51 Mobile SoCs
732 Server / Workstation CPUs
443 Desktop CPUs
583 Mobile CPUs
51 Mobile SoCs
732 Server / Workstation CPUs
443 Desktop CPUs
583 Mobile CPUs
51 Mobile SoCs

Total

2786 CPUs 2786 CPUs 1839 CPUs

For the complete list of affected AMD, Apple, ARM and Intel processors, please see this separate article – The Complete List Of CPUs Vulnerable To Meltdown / Spectre

 

Intel Detection Tool?

The Intel-SA-00086 Detection Tool does NOT detect the processor’s susceptibility to these vulnerabilities. It only checks for different vulnerabilities affecting the Intel Management Engine.

 

InSpectre

Our reader Arthur shared that the Gibson Research Corporation has an aptly-named utility called InSpectre.

It checks for Meltdown and Spectre hardware and software vulnerabilities in a Windows system. It will help you check if your system is getting patched properly against these vulnerabilities.

 

What Is Being Done??? Updated!

Note : The terms “mitigate” and “mitigation” mean the possibility of a successfully attacked are reduced, not eliminated.

  • Intel has started issuing software and firmware updates for the processors introduced in the last 5 years. By the middle of January 2018, Intel expects to have issued updates for more than 90% of those CPUs. However, that does not address the other Intel processors sold between 2010 and 2012.
  • Microsoft and Linux have started to roll our the KPTI (Kernel Page Table Isolation) patch, also known as the KAISER (Kernel Address Isolation to have Side-channels Efficiently Removed) patch.
  • The KPTI or KAISER patch, however, will only protect against the Meltdown exploit. It has no effect on a Spectre attack.
  • Microsoft Edge and Internet Explorer 11 received the KB4056890 security update on 3 January 2018, to prevent a Meltdown attack.
  • Firefox 57 includes changes to mitigate against both attacks.
  • Google Chrome 64 will be released on 23 January 2018, with mitigations against Meltdown and Spectre attacks.
  • For Mac systems, Apple introduced mitigations against Spectre in macOS 10.13.2 (released on 8 January 2018), with more fixes coming in macOS 10.13.3.
  • For iOS devices, Apple introduced mitigations against Meltdown in iOS 11.2 and tvOS 11.2.
  • On 8 January 2018, Apple released iOS 11.2.2, which mitigates the risk of the two Spectre exploits in Safari and WebKit, for iPhone 5s, iPad Air, and iPod touch 6th generation or later.
  • ARM has made available the KPTI / KAISER kernel patches for Linux, while Google will provide them for Android.
  • Google patched Android against both exploits with the December 2017 and January 2018 patches.
  • Google shared details of their Return Rrampoline (Retpoline) binary modification technique that can be used to protect against Spectre attacks. It is a software construct that ensures that any associated speculative execution will “bounce” (as if on a trampoline) endlessly.
  • NVIDIA issued six driver and security updates for affected devices and software between 3-9 January 2018.
  • On 11 January 2018, AMD announced that the “majority of AMD systems” have received the mitigation patches against Spectre 1, albeit some older AMD systems got bricked by bad patches. They also announced that they will make “optional” microcode updates available for Ryzen and EPYC processors by the same week.
  • In the same 11 January 2018 disclosure, AMD also shared that Linux vendors have started to roll out OS patches for both Spectre exploits, and they’re working on the “return trampoline (Retpoline)” software mitigations as well.[adrotate group=”2″]
  • On 23 January 2018, Apple released Meltdown patches for macOS Sierra and OS X El Capitan, but not macOS High Sierra.
  • On 23 January 2018, Microsoft finally revealed their Spectre and Meltdown patch schedule.
  • On 24 January 2018, AMD revealed their 11 software mitigations for both Spectre exploits.
  • The 24 January 2018 AMD whitepaper also revealed that the AMD K10 and K8 processors are vulnerable as well, adding an additional 663 CPU models to the list of vulnerable processors.
  • On 2 February 2018, Microsoft released KB4078130 to disable the Spectre 2 patches that were causing many Intel systems to randomly and spontaneously reboot.
  • On 8 February 2018, an Intel microcode update schedule revealed that their Penryn-based processors are also vulnerable, adding an additional 314 CPU models to the list of vulnerable processors.
  • On 14 February 2018, Intel revealed an expanded Bug Bounty Program, offering up to $250,000 in bounty awards.

 

Some AMD PCs Got Bricked

In the rush to mitigate against Meltdown and Spectre, Microsoft released Windows 10 patches that bricked some AMD PCs. They blamed the incorrect / incomplete documentation provided by AMD.

You can read more about this issue @ These Windows 10 Updates Are Bricking AMD PCs!

 

Buggy Intel Spectre 2 Patches Updated!

Intel’s rush to patch Meltdown and Spectre resulted in buggy microcode patches, causing several generations of their CPUs to randomly and spontaneously reboot.

So far, over 800 Intel CPU models have been identified to be affected by these spontaneous reboot issues. If you have one of the affected CPUs, please hold off BIOS / firmware updates!

Intel has identified the cause as the Spectre 2 patches in their microcode updates for some of these processors. They’re still investigating the cause of the other affected CPU models.

Fortunately for Windows users, Microsoft issued the KB4078130 emergency update to stop the reboots while Intel worked to fix the issue.

You can read more about this issue @ The Intel Spectre Reboot Issue, and the Microsoft solution @ KB4078130 : Emergency Windows Update To Disable Intel Spectre Patches!

 

What Should You Do? Updated!

First and foremost – DO NOT PANIC. There is no known threat or attack using these exploits.

Although we listed a number of important patches below, the buggy updates are worse than the potential threat they try to fix. So we advise HOLDING OFF these patches, and wait for properly-tested versions a few weeks down the line.

  • If you are using Windows, make sure you install the latest Microsoft Spectre and Meltdown updates.
  • If you are using a Mac system, get the latest Apple Spectre and Meltdown patches.
  • If you are using an iOS device, get updated to iOS 11.2 or tvOS 11.2.
  • If you are using Firefox, update to the latest Firefox 57.
  • If you are using Google Chrome, make sure you watch out for Chrome 64, which will be released on 23 January.
  • Download and install the latest software firmware updates from your PC, laptop, motherboard brands. In particular, install the latest driver for the Intel Management Engine (Intel ME), the Intel Trusted Execution Engine (Intel TXE), and the Intel Server Platform Services (SPS)
  • If you are running an ARM processor on Linux, grab the kernel patches.
  • IBM POWER system users can download and install these firmware updates.
  • Users of affected NVIDIA systems can download and install these driver and firmware updates.
  • If you are using an Intel system, hold off updating your firmware, unless you have already verified that your CPU is not affected by the buggy Intel patches, or Intel has already issued corrected patches.

 

The Performance Impact Of The Mitigation Patches

Many benchmarks have been released, showing performance impacts of between 5% to 30%, depending on the type of benchmark and workload. Microsoft has called those benchmark results into question, stating that they did not cover both operating system and silicon microcode patches.

They released an initial report on their findings, which we have summarised in our article – Pre-2016 Intel CPUs Hit Worst By Meltdown + Spectre Fix.

 

Meltdown + Spectre Reading Suggestions

[adrotate group=”2″]

Go Back To > Articles | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Intel Bug Bounty Program : How You Can Earn $250,000 Hunting Bugs!

The Intel Bug Bounty Program was launched in March 2017, but after Meltdown and Spectre, Intel kicked it up a notch. Find out how you can earn up to $250,000 hunting bugs!

 

The New Intel Bug Bounty Program

The Intel Bug Bounty Program was created to incentivise security researchers to hunt for bugs in Intel’s products. However, it was an invitation-only program, which greatly limited the pool of eligible bug hunters.

On 14 February 2018, Rick Echevarria, the Vice President and General Manager of Platform Security at Intel, announced the expansion of the Intel Bug Bounty Program. Here are the changes :

  • The Intel Bug Bounty Program is no longer invitation-only. Anyone who meets the minimum requirements are eligible to participate.
  • Intel created a new bounty targeted specifically at side channel vulnerability (like Meltdown and Spectre). This bounty ends on 31 December 2018, and pays up to $250,000.
  • Intel also raised bounty awards across the board, with awards of up to $100,000 for other vulnerabilities.

 

The New Intel Bug Bounty Awards

Vulnerability Severity Intel Software Intel Firmware Intel Hardware
Critical (9.0 – 10.0) Up to $10,000 Up to $30,000 Up to $100,000
High (7.0 – 8.9) Up to $5,000 Up to $15,000 Up to $30,000
Medium (4.0 – 6.9) Up to $1,500 Up to $3,000 Up to $5,000
Low (0.1 – 3.9) Up to $500 Up to $1000 Up to $2,000
  • Intel will award a Bounty for the first report of a vulnerability with sufficient details to enable reproduction by Intel.
  • Intel will award a Bounty from $500 to $250,000 USD depending on the nature of the vulnerability and quality & content of the report.
  • The first external report received on an internally known vulnerability will receive a maximum of $1,500 USD Award.
  • The approved CVSS calculators which may be used for determining the baseline Severity of all reported vulnerabilities shall be either the NVD CVSSv3 calculator or the FIRST CVSSv3 calculator at Intel’s sole discretion.[adrotate group=”2″]
  • Intel will publicly recognize security researchers on advisories and Bug Bounty collateral, at or after the time of public disclosure of the vulnerability, if & as agreed to by the researcher who reported the vulnerability.
  • Awards are limited to one (1) Bounty Award per eligible root-cause vulnerability. If that vulnerable component is present in other Intel products, a Bounty Award will be paid only for the first reported product instance. Intel, at its sole discretion, will decide whether the reported vulnerability is the first reported product instance of that root-cause vulnerability.

 

The Side Channel Vulnerability Bounty Awards

This is a time-limited bounty that ends on 31 December 2018, and is limited to bugs that are :

  • root-caused to Intel hardware
  • exploitable via software
Vulnerability Severity Intel Hardware w/ Side Channel Exploit through Software
Critical (9.0 – 10.0) Up to $250,000
High (7.0 – 8.9) Up to $100,000
Medium (4.0 – 6.9) Up to $20,000
Low (0.1 – 3.9) Up to $5,000

Next Page > The Program Requirements & Eligible Products

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

The New Intel Bug Bounty Program Requirements

To qualify for the new Intel Bug Bounty Program, you must meet ALL of the following requirements.

  • You are reporting in an individual capacity or, if employed by another company, you have that company’s written approval to submit a report to Intel’s Bug Bounty program.
  • You are at least 18 years of age, and, if considered a minor in your place of residence, you have your parent’s or legal guardian’s permission prior to reporting.
  • You are not a resident of a US-embargoed country.
  • You are not on a US list of sanctioned individuals.
  • You are not currently nor have been an employee of Intel Corporation, or an Intel subsidiary, within 6 months prior to submitting a report.
  • You are not currently nor have been under contract to Intel Corporation, or an Intel subsidiary, within 6 months prior to submitting a report.
  • You are not a family nor household member of any individual who currently or within the past 6 months meets or met the criteria listed in the two bullet points directly above.
  • You agree to participate in testing mitigation effectiveness and coordinating disclosure / release / publication of your finding with Intel.

 

The New Intel Bug Report Requirements

For your Intel bug reports to be eligible for bounty award consideration, they must meet the following requirements :

  • Must be encrypted with the Intel PSIRT public PGP key.
  • Must pertain to an item explicitly listed below as “Eligible Intel products and technologies”.
  • Must identify an original and previously unreported & not publicly disclosed vulnerability.
  • Must have been tested against most recent publicly available version of the affected product or technology.
  • Must include clear documentation on the vulnerability and instructions on how to reproduce the vulnerability.
  • Must include your assessed CVSS v3 vector string, score, and rating using one of the approved CVSS v3 calculators referenced below.

The following are vulnerabilities that will not qualify for bounty awards :

  • Vulnerabilities in pre-release versions (e.g., Beta, Release Candidate).
  • Vulnerabilities in versions no longer under active support.
  • Vulnerabilities already known to Intel.
  • Vulnerabilities present in any component of an Intel product where the root-cause vulnerability in the component has already been identified for another Intel product.
  • Vulnerabilities considered out of scope as defined below.
[adrotate group=”1″]

 

Eligible Intel Products & Technologies

Intel Hardware

  • Processor (inclusive of micro-code ROM + updates)
  • Chipset
  • FPGA
  • Networking / Communication
  • Motherboard / System (e.g., Intel Compute Stick, NUC)
  • Solid State Drives

Intel Firmware

  • UEFI BIOS (Tiano core components for which Intel is the only named maintainer)
  • Intel Management Engine
  • Baseboard Management Controller (BMC)
  • Motherboard / System (e.g., Intel Compute Stick)
  • Solid State Drives

Intel Software

  • Device driver
  • Application
  • Tool

 

Meltdown + Spectre Reading Suggestions

[adrotate group=”2″]

Go Back To > First Page | Articles | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

The AMD Raven Ridge Desktop APU Tech Report Rev. 3.0

At CES 2018, AMD announced the AMD Raven Ridge desktop processors – the long-awaited AMD Ryzen APUs. They are basically AMD Ryzen processors with AMD Radeon Vega graphics built-in. We can now share with you the full details and our reviews of the AMD Raven Ridge desktop APUs!

Updated @ 2018-02-13 : Added the AMD Ryzen 5 2400G and Ryzen 3 2200G review links. Updated various parts of the article.

Updated @ 2018-02-10 : Added two new sections on the new CPU package, L3 cache, PCI Express lanes, and Precision Boost 2. Also updated the section on the Single CCX Configuration.

Originally posted @ 2018-02-08

[/su_spoiler]

 

The AMD Raven Ridge Desktop APU Reviews

Here are the reviews of the new AMD Raven Ridge desktop APUs.

 

The AMD Raven Ridge Desktop APUs

Raven Ridge is AMD’s codename for their Ryzen-Vega APUs (Accelerated Processing Units). First introduced in the mobile segment as the AMD Ryzen Mobile, AMD is now introducing them to the desktop market.

The new Ryzen APUs combine an AMD Ryzen CPU, with an AMD Radeon Vega GPU, in a single die.

AMD Ryzen CPU + AMD Radeon Vega GPU = AMD Ryzen APU

Desktops APUs are not new. AMD have been making them for years, and many Intel desktop processors come with integrated graphics. But AMD is still the only manufacturer to integrate “premium CPU cores” with “premium graphics cores” to deliver gaming for the masses with :

  • 1080p HD+ gaming performance without a discrete graphics card
  • support for Radeon FreeSync, Radeon Chill, Enhanced Sync and Radeon ReLive

 

Single CCX Configuration

Unlike the Summit Ridge-based Ryzen CPUs, the AMD Raven Ridge processors use a single CCX configuration. This is a cost-saving measure with a much smaller die size, that also yield some performance benefits – reduced cache and memory latencies.

AMD analysed the performance of the 2+2 and 4+0 configuration and concluded that they are “roughly equivalent on average across 50+ games“.

 

Smaller L3 Cache

Using a single CCX configuration halves the Raven Ridge L3 cache size from 8 MB to 4 MB. To compensate, AMD increased their base and boost clock speeds, particularly in the Ryzen 5 2400G.

 

New CPU Package

The Raven Ridge APUs also introduce a revised CPU package, and a switch to the traditional non-metallic TIM (thermal interface material). These are again cost-cutting measures, albeit with a side benefit of allowing the Raven Ridge processors to officially support DDR4-2933 memory.

[adrotate group=”1″]

 

Precision Boost 2

The new Raven Ridge processors also boast the improved Precision Boost 2, whose more graceful and linear boost algorithm allows them to “boost more cores, more often, on more workloads“. It is now able to change frequencies in very fine granularity of just 25 MHz.

According to AMD, this will allow the Raven Ridge processors to perform better with apps and games that spawn many lightweight threads, as opposed to apps with persistent loads (e.g. video editing and 3D rendering).

 

PCIe x8 For Discrete GPU

The Summit Ridge-based AMD Ryzen 7, Ryzen 5 and Ryzen 3 processors have 16 PCI Express 3.0 lanes dedicated to the PCIe graphics card. In Raven Ridge, that gets cut down to half. That means any external graphics card will only communicate with a Raven Ridge processor at PCIe x8 speed.

This is a cost-saving measure, making the Raven Ridge processor simpler and cheaper to produce. The Ryzen 3 2200G, for example, is $10 cheaper than its predecessor, the Ryzen 3 1200. They also claim that the move contributed to a smaller and more efficient uncore.

AMD made this decision because “abundant public data has shown that this is a neutral change for the midrange GPUs and workloads likely to be paired with a $99-169 processor“.

Frankly, the Raven Ridge is best used as-is. If you plan to use a discrete graphics card, it makes far more sense to get the Summit Ridge-based AMD Ryzen 7, Ryzen 5 and Ryzen 3 processors instead.

Next Page > Unboxing Raven Ridge, Specifications, Price & Availability

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

The AMD Ryzen 2000G Series APUs Revealed!

As announced at CES 2018, AMD is introducing two Raven Ridge desktop processors as part of the new AMD Ryzen 2000G family – the AMD Ryzen 5 2400G, and the AMD Ryzen 3 2200G.

AMD kindly sent us their Raven Ridge desktop processor media kit, which we unboxed in this video :

 

The AMD Raven Ridge Desktop APU Specification Comparison

For your convenience, we created this table that compares their key specifications with those of their CPU-equivalents – the AMD Ryzen 5 1400 and the AMD Ryzen 3 1200.

SpecificationsAMD Ryzen 5 2400GAMD Ryzen 5 1400AMD Ryzen 3 1200AMD Ryzen 3 2200G
TDP65 W65 W65 W65 W
SocketAM4AM4AM4AM4
Process Technology14 nm FinFET14 nm FinFET14 nm FinFET14 nm FinFET
Transistor Count4.94 Billion4.8 Billion4.8 Billion4.94 Billion
Die Size209.78 mm²192 mm²192 mm²209.78 mm²
CCX Configuration4+02+22+24+0
Processor Cores4444
Number of Simultaneous Threads8844
L2 Cache Size2 MB2 MB2 MB2 MB
L3 Cache Size4 MB8 MB8 MB4 MB
Base Clock Speed3.6 GHz3.2 GHz3.1 GHz3.5 GHz
Boost Clock Speed3.9 GHz3.4 GHz3.4 GHz3.7 GHz
Max. DDR4 SpeedDDR4-2933DDR4-2667DDR4-2667DDR4-2933
GPURadeon RX Vega 11
- 704 stream processors
- 44 TMUs, 16 ROPs
- Up to 1250 MHz
NoneNoneRadeon Vega 8
- 512 stream processors
- 32 TMUs, 16 ROPs
- Up to 1100 MHz
PCI Express LanesPCIe x8PCIe x16PCIe x16PCIe x8
Bundled CPU CoolerAMD Wraith StealthAMD Wraith StealthAMD Wraith StealthAMD Wraith Stealth
Launch PriceUS$ 169US$ 169US$ 109US$ 99

 

AMD Raven Ridge Price & Availability

The AMD Raven Ridge desktop APUs are available for purchase starting 12 February 2018, at the following prices :

[adrotate group=”2″]
  • AMD Ryzen 5 2400G (review) : $169 | RM 759 (inclusive of 6% GST)
  • AMD Ryzen 3 2200G (review) : $99 | RM 479 (inclusive of 6% GST)

At those price points, these Raven Ridge APUs will literally shred Intel processors with integrated graphics to pieces with their value proposition. More cores and more threads, with a much faster graphics core, at such prices. What more can you ask for?

The AMD Raven Ridge desktop APUs will be a relief to many esports gamers, who are suffering from extremely high GPU prices because of cryptocurrency miners.

 

Suggested Reading

Go Back To > First PageComputer Hardware & Systems | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Confirmed : Intel Penryn CPUs Also Vulnerable To Meltdown + Spectre

Intel has always maintained that Meltdown and Spectre only affected their processors from Nehalem onwards. Every list they released publicly has backed that up. However, we can now confirm that even the Intel Penryn CPUs are also vulnerable to Meltdown and Spectre.

 

Intel Penryn CPUs Also Vulnerable To Meltdown + Spectre

Every list Intel ever released on Meltdown and Spectre have only listed their CPUs from the Nehalem microarchitecture onwards. Although it was possible that the Intel Penryn microarchitecture was also affected, Intel conspicuously left them out of every list.

On 8 February 2018, Intel released a schedule of microcode updates meant to fix the random and spontaneous reboot problems they had with their Spectre 2 patches. Hidden in that schedule is the acknowledgement that the Intel Penryn microarchitecture was also vulnerable.

Those who have been tracking the Intel microcode updates will note that the Intel Penryn processors were not mentioned in the last update on 24 January 2018.

 

What Are The Intel Penryn CPUs Vulnerable To Meltdown + Spectre?

 

Meltdown + Spectre Reading Suggestions

[adrotate group=”2″] [adrotate group=”1″]

 

Intel Penryn Server CPUs Vulnerable To Meltdown + Spectre

Intel Yorkfield (2008-2009)

  • Intel Xeon X3380
  • Intel Xeon L3380
  • Intel Xeon X3370
  • Intel Xeon X3360
  • Intel Xeon X3350

Intel Wolfdale (2008-2009)

  • Intel Xeon E3120
  • Intel Xeon E3110
  • Intel Xeon L3110

Intel Dunnington (2008)

  • Intel Xeon X7460
  • Intel Xeon E7458
  • Intel Xeon L7455
  • Intel Xeon E7450
  • Intel Xeon L7445
  • Intel Xeon E7440
  • Intel Xeon E7430
  • Intel Xeon E7420

Intel Yorkfield-6M (2008)

  • Intel Xeon X3330
  • Intel Xeon X3320

Intel Yorkfield-CL (2008)

  • Intel Xeon X3363
  • Intel Xeon X3353
  • Intel Xeon X3323
  • Intel Xeon X3113
  • Intel Xeon L3014

Intel Harpertown (2007-2008)

  • Intel Xeon X5492
  • Intel Xeon X5482
  • Intel Xeon X5472
  • Intel Xeon E5472
  • Intel Xeon E5462
  • Intel Xeon X5470
  • Intel Xeon X5460
  • Intel Xeon X5450
  • Intel Xeon E5450
  • Intel Xeon E5440
  • Intel Xeon E5430
  • Intel Xeon L5430
  • Intel Xeon E5420
  • Intel Xeon L5420
  • Intel Xeon E5410
  • Intel Xeon L5410
  • Intel Xeon L5408
  • Intel Xeon E5405

Intel Wolfdale-DP (2007-2008)

  • Intel Xeon X5272
  • Intel Xeon X5270
  • Intel Xeon X5260
  • Intel Xeon L5248
  • Intel Xeon X5240
  • Intel Xeon L5240
  • Intel Xeon L5238
  • Intel Xeon X5220
  • Intel Xeon L5215
  • Intel Xeon X5205

Intel Tigerton (2007)

  • Intel Xeon X7350
  • Intel Xeon L7345
  • Intel Xeon E7340
  • Intel Xeon E7330
  • Intel Xeon E7320
  • Intel Xeon E7310
  • Intel Xeon E7220
  • Intel Xeon E7210

Intel Kentsfield (2007)

  • Intel Xeon X3230
  • Intel Xeon X3220
  • Intel Xeon X3210

Intel Allendale (2007)

  • Intel Xeon 3050
  • Intel Xeon 3040

Intel Clovertown (2006-2007)

  • Intel Xeon X5365
  • Intel Xeon X5355
  • Intel Xeon X5350
  • Intel Xeon E5350
  • Intel Xeon E5345
  • Intel Xeon E5340
  • Intel Xeon E5335
  • Intel Xeon L5335
  • Intel Xeon E5330
  • Intel Xeon E5320
  • Intel Xeon L5320
  • Intel Xeon L5318
  • Intel Xeon E5310
  • Intel Xeon L5310

Intel Conroe (2006-2007)

  • Intel Xeon 3085
  • Intel Xeon 3075
  • Intel Xeon 3070
  • Intel Xeon 3065
  • Intel Xeon 3060
  • Intel Xeon 3050
  • Intel Xeon 3040

Intel Woodcrest (2006)

  • Intel Xeon 5160
  • Intel Xeon 5150
  • Intel Xeon LV 5148
  • Intel Xeon 5140
  • Intel Xeon LV 5138
  • Intel Xeon LV 5133
  • Intel Xeon 5130
  • Intel Xeon LV 5128
  • Intel Xeon 5120
  • Intel Xeon LV 5113
  • Intel Xeon 5110

Next Page > Intel Penryn Desktop + Mobile CPUs Vulnerable To Meltdown + Spectre

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Intel Penryn Desktop CPUs Vulnerable To Meltdown + Spectre

Intel Yorkfield-6M (2008-2010)

  • Intel Core 2 Quad Q9705
  • Intel Core 2 Quad Q9700
  • Intel Core 2 Quad Q9505S
  • Intel Core 2 Quad Q9505
  • Intel Core 2 Quad Q9500
  • Intel Core 2 Quad Q9400S
  • Intel Core 2 Quad Q9400
  • Intel Core 2 Quad Q9300
  • Intel Core 2 Quad Q8400S
  • Intel Core 2 Quad Q8400
  • Intel Core 2 Quad Q8300
  • Intel Core 2 Quad Q8200S
  • Intel Core 2 Quad Q8200

Intel Yorkfield (2008-2009)

  • Intel Core 2 Quad Q9650
  • Intel Core 2 Quad Q9550S
  • Intel Core 2 Quad Q9550
  • Intel Core 2 Quad Q9450S
  • Intel Core 2 Quad Q9450

Intel Wolfdale (2008-2009)

  • Intel Core 2 Duo E8700
  • Intel Core 2 Duo E8600
  • Intel Core 2 Duo E8500
  • Intel Core 2 Duo E8400
  • Intel Core 2 Duo E8300
  • Intel Core 2 Duo E8290
  • Intel Core 2 Duo E8200
  • Intel Core 2 Duo E8190

Intel Wolfdale-3M (2008-2010)

  • Intel Core 2 Duo E7600
  • Intel Core 2 Duo E7500
  • Intel Core 2 Duo E7400
  • Intel Core 2 Duo E7300
  • Intel Core 2 Duo E7200
  • Intel Pentium E6800
  • Intel Pentium E6700
  • Intel Pentium E6600
  • Intel Pentium E6500K
  • Intel Pentium E6500
  • Intel Pentium E6300
  • Intel Pentium E5800
  • Intel Pentium E5700
  • Intel Pentium E5500
  • Intel Pentium E5400
  • Intel Pentium E5300
  • Intel Pentium Dual-Core E5300
  • Intel Pentium E5200
  • Intel Pentium Dual-Core E5200
  • Intel Pentium Dual-Core E2210
  • Intel Celeron E3500
  • Intel Celeron E3400
  • Intel Celeron E3300
  • Intel Celeron E3200

Intel Allendale (2008-2009)

  • Intel Celeron E1600
  • Intel Celeron E1500
  • Intel Celeron E1400
  • Intel Celeron E1200

Intel Yorkfield-XE (2007-2008)

  • Intel Core 2 Extreme QX9775
  • Intel Core 2 Extreme QX9770
  • Intel Core 2 Extreme QX9650

Intel Conroe-L (2007-2008)

  • Intel Celeron 450
  • Intel Celeron 445
  • Intel Celeron 430
  • Intel Celeron 420
  • Intel Celeron 220

Intel Kentsfield (2007)

  • Intel Core 2 Quad Q6700
  • Intel Core 2 Quad Q6600
  • Intel Core 2 Quad Q6400

Intel Conroe-CL (2007)

  • Intel Core 2 Duo E6405
  • Intel Core 2 Duo E6305
  • Intel Celeron 445

Intel Conroe (2006-2008)

  • Intel Core 2 Duo E6850
  • Intel Core 2 Duo E6750
  • Intel Core 2 Duo E6700
  • Intel Core 2 Duo E6600
  • Intel Core 2 Duo E6550
  • Intel Core 2 Duo E6540
  • Intel Core 2 Duo E6420
  • Intel Core 2 Duo E6400
  • Intel Core 2 Duo E6320
  • Intel Core 2 Duo E6300
  • Intel Core 2 Duo E4700
  • Intel Core 2 Duo E4600
  • Intel Core 2 Duo E4500
  • Intel Core 2 Duo E4400
  • Intel Core 2 Duo E4300
  • Intel Pentium Dual-Core E2220
  • Intel Pentium Dual-Core E2200
  • Intel Pentium Dual-Core E2180
  • Intel Pentium Dual-Core E2160
  • Intel Pentium Dual-Core E2140

Intel Kentsfield-XE (2006-2007)

  • Intel Core 2 Extreme QX6850
  • Intel Core 2 Extreme QX6800
  • Intel Core 2 Extreme QX6700
[adrotate group=”1″]

 

Intel Penryn Mobile CPUs Vulnerable To Meltdown + Spectre

Intel Penryn-3M (2008-2011)

  • Intel Core 2 Duo SU9600
  • Intel Core 2 Duo SP9600
  • Intel Core 2 Duo SU9400
  • Intel Core 2 Duo SP9400
  • Intel Core 2 Duo SU9300
  • Intel Core 2 Duo SP9300
  • Intel Core 2 Duo SU7300
  • Intel Pentium T4500
  • Intel Pentium T4400
  • Intel Pentium T4300
  • Intel Pentium T4200
  • Intel Pentium SU4100
  • Intel Pentium SU2700
  • Intel Celeron T3500
  • Intel Celeron T3300
  • Intel Celeron T3100
  • Intel Celeron T3000
  • Intel Celeron SU2300
  • Intel Celeron 925
  • Intel Celeron 900
  • Intel Celeron ULV 763
  • Intel Celeron M ULV 743
  • Intel Celeron M ULV 723
  • Intel Celeron M ULV 722

Intel Penryn-L (2008-2009)

  • Intel Core 2 Solo SU3500
  • Intel Core 2 Solo SU3300

Intel Penryn (2008-2009)

  • Intel Core 2 Duo T9900
  • Intel Core 2 Duo T9800
  • Intel Core 2 Duo P9700
  • Intel Core 2 Duo P9600
  • Intel Core 2 Duo T9600
  • Intel Core 2 Duo SL9600
  • Intel Core 2 Duo T9550
  • Intel Core 2 Duo P9500
  • Intel Core 2 Duo T9500
  • Intel Core 2 Duo SL9400
  • Intel Core 2 Duo T9400
  • Intel Core 2 Duo SL9380
  • Intel Core 2 Duo SL9300
  • Intel Core 2 Duo T9300
  • Intel Core 2 Duo P8800
  • Intel Core 2 Duo P8700
  • Intel Core 2 Duo P8600
  • Intel Core 2 Duo E8435
  • Intel Core 2 Duo P8400
  • Intel Core 2 Duo E8335
  • Intel Core 2 Duo T8300
  • Intel Core 2 Duo E8235
  • Intel Core 2 Duo E8135
  • Intel Core 2 Duo T8100
  • Intel Core 2 Duo P7570
  • Intel Core 2 Duo P7550
  • Intel Core 2 Duo P7460
  • Intel Core 2 Duo P7450
  • Intel Core 2 Duo P7370
  • Intel Core 2 Duo P7350
  • Intel Core 2 Duo T6970
  • Intel Core 2 Duo T6900
  • Intel Core 2 Duo T6670
  • Intel Core 2 Duo T6600
  • Intel Core 2 Duo T6570
  • Intel Core 2 Duo T6500
  • Intel Core 2 Duo T6400

Intel Penryn QC-XE (2008)

  • Intel Core 2 Extreme QX9300

Intel Penryn QC (2008)

  • Intel Core 2 Quad Q9100
  • Intel Core 2 Quad Q9000

Intel Merom-2M (2007-2008)

  • Intel Core 2 Duo U7700
  • Intel Core 2 Duo U7600
  • Intel Core 2 Duo U7500
  • Intel Pentium Dual-Core T3400
  • Intel Pentium Dual-Core T3200
  • Intel Pentium Dual-Core T2410
  • Intel Pentium Dual-Core T2390
  • Intel Pentium Dual-Core T2370
  • Intel Pentium Dual-Core T2330
  • Intel Pentium Dual-Core T2310
  • Intel Celeron T1700
  • Intel Celeron T1600
  • Intel Celeron T1500
  • Intel Celeron T1400
  • Intel Celeron 585
  • Intel Celeron 575

Intel Merom-L (2007)

  • Intel Core 2 Solo ULV U2200
  • Intel Core 2 Solo ULV U2100
  • Intel Celeron ULV 573
  • Intel Celeron M ULV 523

Intel Merom (2007)

  • Intel Core 2 Duo T7800
  • Intel Core 2 Duo T7700
  • Intel Core 2 Duo SP7700
  • Intel Core 2 Duo L7700
  • Intel Core 2 Duo T7600G
  • Intel Core 2 Duo T7600
  • Intel Core 2 Duo SP7500
  • Intel Core 2 Duo T7500
  • Intel Core 2 Duo L7500
  • Intel Core 2 Duo T7400
  • Intel Core 2 Duo L7400
  • Intel Core 2 Duo T7300
  • Intel Core 2 Duo L7300
  • Intel Core 2 Duo T7250
  • Intel Core 2 Duo T7200
  • Intel Core 2 Duo L7200
  • Intel Core 2 Duo T7100
  • Intel Core 2 Duo SL7100
  • Intel Core 2 Duo T5900
  • Intel Core 2 Duo T5800
  • Intel Core 2 Duo T5750
  • Intel Core 2 Duo T5670
  • Intel Core 2 Duo T5600
  • Intel Core 2 Duo T5550
  • Intel Core 2 Duo T5500
  • Intel Core 2 Duo T5470
  • Intel Core 2 Duo T5450
  • Intel Core 2 Duo T5300
  • Intel Core 2 Duo T5270
  • Intel Core 2 Duo T5250
  • Intel Core 2 Duo T5200
  • Intel Celeron 570
  • Intel Celeron 560
  • Intel Celeron 550
  • Intel Celeron 540
  • Intel Celeron 530
  • Intel Celeron M 530
  • Intel Celeron M 520

Intel Merom-XE (2007)

  • Intel Core 2 Extreme X7900
  • Intel Core 2 Extreme X7800

 

Meltdown + Spectre Reading Suggestions

[adrotate group=”2″]

Go Back To > First Page | Articles | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Details Of The Samsung DeX Pad for Galaxy S9 Leaked!

The upcoming Samsung Galaxy S9 promises a big upgrade in photographic capabilities, but that’s not all Samsung will be revealing soon. To be paired with the Samsung Galaxy S9 – a new DeX docking station called the Samsung DeX Pad.

 

Introducing The Samsung DeX Pad for Galaxy S9!

The Samsung DeX dock was originally designed for the Samsung Galaxy S8, allowing for a desktop-like working experience. All you need to do is hook up the DeX to a display, a mouse and a keyboard.

Thanks to serial leaker Evan Blass, we now have the actual pictures and details of the new Samsung DeX Pad dock, which will complement the upcoming Samsung Galaxy S9.

The Samsung DeX Pad will retain these ports :

  • two full-size USB 2.0 Type A ports,
  • a full-size HDMI 2.0 port, and
  • a USB 3.1 Type C port (for power input).

There are some changes over the original Samsung DeX though :

  • The smartphone will lay flat on the DeX Pad.
  • The 100 Mbps Ethernet port has been removed.

The flat layout is said to allow the Galaxy S9 to be used as a touch pad, or virtual keyboard.

However, that may not be very practical, since the Galaxy S9 will be significantly elevated above the table. The dock connector, which appears to jut above the base of the docked smartphone, will also get in the way.

The missing LAN port is no real loss. Some hotels still offer Internet over LAN cables, but the vast majority will offer WiFi access as well.

Although it will be marketed at Galaxy S9 users, the DeX Pad will likely work with Samsung Galaxy S8 devices as well.

Don’t forget to check out Everything You Need To Know About The Samsung Galaxy S9!

Go Back To > Articles | Home

[adrotate group=”1″]

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Confirmed : AMD K10 And K8 Processors Also Vulnerable To Spectre

It is common knowledge that the latest AMD Ryzen 7, Ryzen 5 and Ryzen 3 are vulnerable to the Spectre exploits, and so are the older AMD processors based on their Bulldozer microarchitecture. But what about the AMD K10 and K8 processors? Today, we can confirm that AMD K10 and K8 processors from as far back as 2003 are vulnerable to Spectre.

 

AMD K10 And K8 Processors Are Also Vulnerable To Spectre

AMD has been transparent about how AMD processors are vulnerable to both Spectre exploits, and their mitigation strategies. However, they have never revealed which AMD processors are affected by the Spectre exploits.

While it was common knowledge that the latest AMD Ryzen 7, Ryzen 5 and Ryzen 3, as well as the Bulldozer-based APUs are vulnerable to Spectre, no one knew for sure whether the older AMD K10 and K8 processors were also affected. After all, they were based on a different microarchitecture.

That was until they revealed their Spectre mitigation strategies. Hidden in their whitepaper were references to AMD Family 10h (also known as AMD K10), as well as AMD Family 0Fh (also known as AMD K8).

So we now know, for sure, that the AMD K10 and AMD K8 processors are also vulnerable to Spectre.

 

What Are The Affected AMD K10 & K8 Processors?

The AMD K10 family alone adds 96 AMD server CPUs, 168 AMD desktop CPUs, and 77 AMD mobile CPUs to the list of vulnerable processors.

The AMD K8 family adds a further 128 AMD server CPUs, 137 AMD desktop CPUs, and 57 AMD mobile CPUs to the list.

For your convenience, we included the entire list of vulnerable AMD K10 and AMD K8 processors, split into three lists :

 

Meltdown + Spectre Reading Suggestions

[adrotate group=”2″]

 

Vulnerable AMD K10 And K8 Server CPUs

AMD Magny-Cours (2010)

  • AMD Opteron 6180 SE
  • AMD Opteron 6176 SE
  • AMD Opteron 6176
  • AMD Opteron 6174
  • AMD Opteron 6172
  • AMD Opteron 6168
  • AMD Opteron 6164 HE
  • AMD Opteron 6140
  • AMD Opteron 6136
  • AMD Opteron 6134
  • AMD Opteron 6132 HE
  • AMD Opteron 6128
  • AMD Opteron 6128 HE
  • AMD Opteron 61QS
  • AMD Opteron 61KS
  • AMD Opteron 6124 HE

AMD Lisbon (2010)

  • AMD Opteron 4184
  • AMD Opteron 4180
  • AMD Opteron 4176 HE
  • AMD Opteron 4174 HE
  • AMD Opteron 4171 HE
  • AMD Opteron 4170 HE
  • AMD Opteron 41KX HE
  • AMD Opteron 4164 EE
  • AMD Opteron 4162 EE
  • AMD Opteron 41GL EE
  • AMD Opteron 4133
  • AMD Opteron 4130
  • AMD Opteron 4122
  • AMD Opteron 41QS HE
  • AMD Opteron 41LE HE

AMD Istanbul (2009)

  • AMD Opteron 8439 SE
  • AMD Opteron 8435
  • AMD Opteron 8431
  • AMD Opteron 8425 HE
  • AMD Opteron 8423
  • AMD Opteron 8419
  • AMD Opteron 8419 EE
  • AMD Opteron 2439 SE
  • AMD Opteron 2435
  • AMD Opteron 2431
  • AMD Opteron 2427
  • AMD Opteron 2425 HE
  • AMD Opteron 2423 HE
  • AMD Opteron 2419
  • AMD Opteron 2419 EE

AMD Suzuka (2009)

  • AMD Opteron 1389
  • AMD Opteron 1385
  • AMD Opteron 1381
  • AMD Opteron 13QS HE
  • AMD Opteron 13KS EE

AMD Shanghai (2009)

  • Opteron 8393 SE
  • Opteron 8389
  • Opteron 8387
  • Opteron 8386 SE
  • Opteron 8384
  • Opteron 8382
  • Opteron 8381 HE
  • Opteron 8380
  • Opteron 8379 HE
  • Opteron 8378
  • Opteron 83VS
  • Opteron 8374 HE
  • Opteron 83QS HE
  • Opteron 2393 SE
  • Opteron 2389
  • Opteron 2387
  • Opteron 2386 SE
  • Opteron 2384
  • Opteron 2382
  • Opteron 2381 HE
  • Opteron 2380
  • Opteron 2379 HE
  • Opteron 2378
  • Opteron 2377 EE
  • Opteron 2376
  • Opteron 2376 HE
  • Opteron 23VS
  • Opteron 2374 HE
  • Opteron 2373 EE
  • Opteron 2372 HE
  • Opteron 23QS HE
  • Opteron 23KS EE

AMD Budapest (2008)

  • AMD Opteron 1356
  • AMD Opteron 1354
  • AMD Opteron 1352

AMD Barcelona (2007)

  • AMD Opteron 8360 SE
  • AMD Opteron 8357 SE
  • AMD Opteron 8356
  • AMD Opteron 8354
  • AMD Opteron 8352
  • AMD Opteron 8350
  • AMD Opteron 8350 HE
  • AMD Opteron 8347
  • AMD Opteron 8347 HE
  • AMD Opteron 8346 HE

AMD Santa Rosa (2006)

  • AMD Opteron 8224 SE
  • AMD Opteron 8222 SE
  • AMD Opteron 8222
  • AMD Opteron 8220 SE
  • AMD Opteron 8220
  • AMD Opteron 8218
  • AMD Opteron 8218 HE
  • AMD Opteron 8216
  • AMD Opteron 8216 HE
  • AMD Opteron 8214
  • AMD Opteron 8214 HE
  • AMD Opteron 8212
  • AMD Opteron 8212 HE
  • AMD Opteron 8210 EE
  • AMD Opteron 2224 SE
  • AMD Opteron 2222 SE
  • AMD Opteron 2222
  • AMD Opteron 2220 SE
  • AMD Opteron 2220
  • AMD Opteron 2218
  • AMD Opteron 2218 HE
  • AMD Opteron 2216
  • AMD Opteron 2216 HE
  • AMD Opteron 2214
  • AMD Opteron 2214 HE
  • AMD Opteron 2212
  • AMD Opteron 2212 HE
  • AMD Opteron 2210
  • AMD Opteron 2210 HE
  • AMD Opteron 2210 EE
  • AMD Opteron 2208 HE

AMD Santa Ana (2006)

  • AMD Opteron 1224 SE
  • AMD Opteron 1222 SE
  • AMD Opteron 1222
  • AMD Opteron 1220 SE
  • AMD Opteron 1220
  • AMD Opteron 1218
  • AMD Opteron 1218 HE
  • AMD Opteron 1216
  • AMD Opteron 1216 HE
  • AMD Opteron 1214
  • AMD Opteron 1214 HE
  • AMD Opteron 1212
  • AMD Opteron 1212 HE
  • AMD Opteron 1210
  • AMD Opteron 1210 HE
  • AMD Opteron 1210 EE

AMD Egypt (2005)

  • AMD Opteron 890
  • AMD Opteron 885
  • AMD Opteron 880
  • AMD Opteron 875
  • AMD Opteron 875 HE
  • AMD Opteron 870
  • AMD Opteron 870 HE
  • AMD Opteron 865
  • AMD Opteron 865 HE
  • AMD Opteron 860 HE

AMD Italy (2005)

  • AMD Opteron 290
  • AMD Opteron 285
  • AMD Opteron 280
  • AMD Opteron 275
  • AMD Opteron 275 HE
  • AMD Opteron 270
  • AMD Opteron 270 HE
  • AMD Opteron 265
  • AMD Opteron 265 HE
  • AMD Opteron 260 HE

AMD Denmark (2005)

  • AMD Opteron 190
  • AMD Opteron 185
  • AMD Opteron 180
  • AMD Opteron 175
  • AMD Opteron 170
  • AMD Opteron 165

AMD Athens (2004)

  • AMD Opteron 856
  • AMD Opteron 854
  • AMD Opteron 852
  • AMD Opteron 850
  • AMD Opteron 850 HE
  • AMD Opteron 848
  • AMD Opteron 848 HE
  • AMD Opteron 846
  • AMD Opteron 846 HE
  • AMD Opteron 844
  • AMD Opteron 842

AMD Troy (2004)

  • AMD Opteron 256
  • AMD Opteron 254
  • AMD Opteron 252
  • AMD Opteron 250
  • AMD Opteron 250 HE
  • AMD Opteron 248
  • AMD Opteron 248 HE
  • AMD Opteron 246
  • AMD Opteron 246 HE
  • AMD Opteron 244
  • AMD Opteron 242

AMD Venus (2004)

  • AMD Opteron 156
  • AMD Opteron 154
  • AMD Opteron 152
  • AMD Opteron 150
  • AMD Opteron 148
  • AMD Opteron 148 HE
  • AMD Opteron 146
  • AMD Opteron 144
  • AMD Opteron 142

AMD Sledgehammer (2003)

  • AMD Opteron 850
  • AMD Opteron 848
  • AMD Opteron 846
  • AMD Opteron 846 HE
  • AMD Opteron 844
  • AMD Opteron 842
  • AMD Opteron 840
  • AMD Opteron 840 EE
  • AMD Opteron 250
  • AMD Opteron 248
  • AMD Opteron 246
  • AMD Opteron 246 HE
  • AMD Opteron 244
  • AMD Opteron 242
  • AMD Opteron 240
  • AMD Opteron 240 EE
  • AMD Opteron 150
  • AMD Opteron 148
  • AMD Opteron 146
  • AMD Opteron 146 HE
  • AMD Opteron 144
  • AMD Opteron 142
  • AMD Opteron 140
  • AMD Opteron 140 EE

Next Page > The Vulnerable AMD K10 And K8 Desktop CPUs

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


Vulnerable AMD K10 And K8 Desktop CPUs

AMD Llano (2011)

  • AMD A8-3870K
  • AMD A8-3850
  • AMD A8-3820
  • AMD A8-3800
  • AMD A6-3670K
  • AMD A6-3650
  • AMD A6-3620
  • AMD A6-3600
  • AMD A4-3420
  • AMD A4-3400
  • AMD A4-3330
  • AMD E2-3200
  • AMD Athlon II X4 651K
  • AMD Athlon II X4 651
  • AMD Athlon II X4 641
  • AMD Athlon II X4 638
  • AMD Athlon II X4 631
  • AMD Athlon II X2 221
  • AMD Sempron X2 198

AMD Propus (2011)

  • AMD Phenom II X4 850
  • AMD Phenom II X4 840
  • AMD Athlon II X4 650
  • AMD Athlon II X4 645
  • AMD Athlon II X4 640
  • AMD Athlon II X4 635
  • AMD Athlon II X4 630
  • AMD Athlon II X4 620
  • AMD Athlon II X4 620e
  • AMD Athlon II X4 615e
  • AMD Athlon II X4 610e
  • AMD Athlon II X4 605e
  • AMD Athlon II X4 600e

AMD Regor (2011)

  • AMD Phenom II X2 521
  • AMD Phenom II X2 511
  • AMD Athlon II X2 B30
  • AMD Athlon II X2 280
  • AMD Athlon II X2 B28
  • AMD Athlon II X2 270
  • AMD Athlon II X2 270u
  • AMD Athlon II X2 265
  • AMD Athlon II X2 260
  • AMD Athlon II X2 260u
  • AMD Athlon II X2 B26
  • AMD Athlon II X2 255
  • AMD Athlon II X2 250e
  • AMD Athlon II X2 250
  • AMD Athlon II X2 250u
  • AMD Athlon II X2 245e
  • AMD Athlon II X2 245
  • AMD Athlon II X2 240e
  • AMD Athlon II X2 240
  • AMD Athlon II X2 B24
  • AMD Athlon II X2 235e
  • AMD Athlon II X2 220
  • AMD Athlon II X2 B22
  • AMD Athlon II X2 215
  • AMD Athlon II X2 210e
  • AMD Sempron 190
  • AMD Sempron 180

AMD Zosma (2010)

  • AMD Phenom II X4 970 Black Edition
  • AMD Phenom II X4 960T Black Edition
  • AMD Phenom II X4 960T
  • AMD Phenom II X4 840T
  • AMD Phenom II X4 650T
  • AMD Athlon II X4 640

AMD Thuban (2010)

  • AMD Phenom II X6 1100T Black Edition
  • AMD Phenom II X6 1090T Black Edition
  • AMD Phenom II X6 1075T Black Edition
  • AMD Phenom II X6 1075T
  • AMD Phenom II X6 1065T
  • AMD Phenom II X6 1055T
  • AMD Phenom II X6 1045T
  • AMD Phenom II X6 1035T

AMD Sargas (2009)

  • AMD Athlon II 170u
  • AMD Athlon II 160u
  • AMD Sempron 150
  • AMD Sempron 145
  • AMD Sempron 140
  • AMD Sempron 130

AMD Deneb (2009)

  • AMD Phenom II 42 TWKR
  • AMD Phenom II X4 980 Black Edition
  • AMD Phenom II X4 975 Black Edition
  • AMD Phenom II X4 970 Black Edition
  • AMD Phenom II X4 965 Black Edition
  • AMD Phenom II X4 B99
  • AMD Phenom II X4 955 Black Edition
  • AMD Phenom II X4 955
  • AMD Phenom II X4 B97
  • AMD Phenom II X4 945
  • AMD Phenom II X4 940 Black Edition
  • AMD Phenom II X4 B95
  • AMD Phenom II X4 925
  • AMD Phenom II X4 920
  • AMD Phenom II X4 B93
  • AMD Phenom II X4 910e
  • AMD Phenom II X4 910
  • AMD Phenom II X4 905e
  • AMD Phenom II X4 900e
  • AMD Phenom II X4 830
  • AMD Phenom II X4 820
  • AMD Phenom II X4 810
  • AMD Phenom II X4 805

AMD Heka (2009)

  • AMD Phenom II X3 B77
  • AMD Phenom II X3 740 Black Edition
  • AMD Phenom II X3 B75
  • AMD Phenom II X3 720 Black Edition
  • AMD Phenom II X3 B73
  • AMD Phenom II X3 720
  • AMD Phenom II X3 715 Black Edition
  • AMD Phenom II X3 710
  • AMD Phenom II X3 705e
  • AMD Phenom II X3 700e

AMD Callisto (2009)

  • AMD Phenom II X2 570 Black Edition
  • AMD Phenom II X2 B60
  • AMD Phenom II X2 565 Black Edition
  • AMD Phenom II X2 B59
  • AMD Phenom II X2 560 Black Edition
  • AMD Phenom II X2 555 Black Edition
  • AMD Phenom II X2 B57
  • AMD Phenom II X2 550 Black Edition
  • AMD Phenom II X2 550
  • AMD Phenom II X2 B55
  • AMD Phenom II X2 545
  • AMD Phenom II X2 B53

AMD Rana (2009)

  • AMD Athlon II X3 460
  • AMD Athlon II X3 455
  • AMD Athlon II X3 450
  • AMD Athlon II X3 445
  • AMD Athlon II X3 440
  • AMD Athlon II X3 435
  • AMD Athlon II X3 425e
  • AMD Athlon II X3 425
  • AMD Athlon II X3 420e
  • AMD Athlon II X3 415e
  • AMD Athlon II X3 405e
  • AMD Athlon II X3 400e
[adrotate group=”1″]

AMD Agena (2008)

  • AMD Phenom X4 9950 Black Edition
  • AMD Phenom X4 9850 Black Edition
  • AMD Phenom X4 9850B
  • AMD Phenom X4 9850
  • AMD Phenom X4 9750B
  • AMD Phenom X4 9750
  • AMD Phenom X4 9650
  • AMD Phenom X4 9600B
  • AMD Phenom X4 9600
  • AMD Phenom X4 9550
  • AMD Phenom X4 9500
  • AMD Phenom X4 9450
  • AMD Phenom X4 9350
  • AMD Phenom X4 9150e
  • AMD Phenom X4 9100e

AMD Toliman (2008)

  • AMD Phenom X3 8850
  • AMD Phenom X3 8750 Black Edition
  • AMD Phenom X3 8750
  • AMD Phenom X3 8750B
  • AMD Phenom X3 8650
  • AMD Phenom X3 8600B
  • AMD Phenom X3 8600
  • AMD Phenom X3 8550
  • AMD Phenom X3 8450e
  • AMD Phenom X3 8450
  • AMD Phenom X3 8400
  • AMD Phenom X3 8250e

AMD Kuma (2008)

  • AMD Athlon X2 7850 Black Edition
  • AMD Athlon X2 7750 Black Edition
  • AMD Athlon X2 7550
  • AMD Athlon X2 7450
  • AMD Athlon X2 6500 Black Edition

AMD Brisbane (2007)

  • AMD Athlon X2 5600B
  • AMD Athlon X2 5400B
  • AMD Athlon X2 5200B
  • AMD Athlon X2 5000B
  • AMD Athlon X2 5050e
  • AMD Athlon X2 4850B
  • AMD Athlon X2 4850e
  • AMD Athlon X2 4450B
  • AMD Athlon X2 4450e
  • AMD Athlon X2 4050e
  • AMD Athlon X2 3250e
  • AMD Athlon X2 BE-2400
  • AMD Athlon X2 BE-2350
  • AMD Athlon X2 BE-2300
  • AMD Athlon 64 X2 6000+
  • AMD Athlon 64 X2 5800+
  • AMD Athlon 64 X2 5600+
  • AMD Athlon 64 X2 5400+ Black Edition
  • AMD Athlon 64 X2 5400+
  • AMD Athlon 64 X2 5200+
  • AMD Athlon 64 X2 5000+ Black Edition
  • AMD Athlon 64 X2 5000+
  • AMD Athlon 64 X2 4800+
  • AMD Athlon 64 X2 4600+
  • AMD Athlon 64 X2 4400+
  • AMD Athlon 64 X2 4200+
  • AMD Athlon 64 X2 4000+
  • AMD Athlon 64 X2 3600+
  • AMD Sempron X2 2300
  • AMD Sempron X2 2200
  • AMD Sempron X2 2100

AMD Lima (2007)

  • AMD Athlon 64 3800+
  • AMD Athlon 64 3500+
  • AMD Athlon 64 3100+
  • AMD Athlon 64 2850e
  • AMD Athlon 64 2600+
  • AMD Athlon 64 2650e
  • AMD Athlon 64 2000+
  • AMD Athlon LE-1660
  • AMD Athlon LE-1640
  • AMD Athlon LE-1640B

AMD Sparta (2006)

  • AMD Sempron LE-1300
  • AMD Sempron LE-1250
  • AMD Sempron LE-1200
  • AMD Sempron LE-1150
  • AMD Sempron LE-1100

AMD Windsor (2006)

  • AMD Athlon 64 FX-74
  • AMD Athlon 64 FX-72
  • AMD Athlon 64 FX-70
  • AMD Athlon 64 FX-62
  • AMD Athlon 64 X2 6400+ Black Edition
  • AMD Athlon 64 X2 6000+
  • AMD Athlon 64 X2 5600+
  • AMD Athlon 64 X2 5400+
  • AMD Athlon 64 X2 5200+
  • AMD Athlon 64 X2 5000+
  • AMD Athlon 64 X2 4800+
  • AMD Athlon 64 X2 4600+
  • AMD Athlon 64 X2 4400+
  • AMD Athlon 64 X2 4200+
  • AMD Athlon 64 X2 4000+
  • AMD Athlon 64 X2 3800+
  • AMD Athlon 64 X2 3600+

AMD Manila (2006)

  • AMD Sempron 3800+
  • AMD Sempron 3600+
  • AMD Sempron 3500+
  • AMD Sempron 3400+
  • AMD Sempron 3200+
  • AMD Sempron 3000+
  • AMD Sempron 2800+

AMD Orleans (2006)

  • AMD Athlon 64 4000+
  • AMD Athlon 64 3800+
  • AMD Athlon 64 3500+
  • AMD Athlon 64 3200+
  • AMD Athlon 64 3000+
  • AMD Athlon 64 LE-1640
  • AMD Athlon 64 LE-1620
  • AMD Athlon 64 LE-1600

AMD Toledo (2005)

  • AMD Athlon 64 FX-60
  • AMD Athlon 64 X2 4800+
  • AMD Athlon 64 X2 4600+
  • AMD Athlon 64 X2 4400+
  • AMD Athlon 64 X2 4200+
  • AMD Athlon 64 X2 4000+
  • AMD Athlon 64 X2 3800+
  • AMD Athlon 64 X2 3700+

AMD Palermo (2005)

  • AMD Sempron 3500+
  • AMD Sempron 3400+
  • AMD Sempron 3300+
  • AMD Sempron 3200+
  • AMD Sempron 3100+
  • AMD Sempron 3000+
  • AMD Sempron 2800+
  • AMD Sempron 2600+
  • AMD Sempron 2500+

AMD Manchester (2005)

  • AMD Athlon 64 X2 4600+
  • AMD Athlon 64 X2 4200+
  • AMD Athlon 64 X2 3800+
  • AMD Athlon 64 X2 3600+
  • AMD Athlon 64 X2 3500+
  • AMD Athlon 64 X2 3200+

AMD San Diego (2005)

  • AMD Athlon 64 FX-57
  • AMD Athlon 64 FX-55
  • AMD Athlon 64 4000+
  • AMD Athlon 64 3700+
  • AMD Athlon 64 3500+

AMD Venice (2005)

  • AMD Athlon 64 3800+
  • AMD Athlon 64 3500+
  • AMD Athlon 64 3400+
  • AMD Athlon 64 3200+
  • AMD Athlon 64 3000+
  • AMD Athlon 64 1500+

AMD Winchester (2004)

  • AMD Athlon 64 3500+
  • AMD Athlon 64 3200+
  • AMD Athlon 64 3000+

AMD Paris (2004)

  • AMD Sempron 3100+
  • AMD Sempron 3000+

AMD Clawhammer (2004)

  • AMD Athlon 64 FX-55
  • AMD Athlon 64 FX-53
  • AMD Athlon 64 4000+
  • AMD Athlon 64 3800+
  • AMD Athlon 64 3700+
  • AMD Athlon 64 3600+
  • AMD Athlon 64 3500+
  • AMD Athlon 64 3400+
  • AMD Athlon 64 3200+
  • AMD Athlon 64 3000+
  • AMD Athlon 64 2800+

AMD Newcastle (2003)

  • AMD Athlon 64 3800+
  • AMD Athlon 64 3500+
  • AMD Athlon 64 3400+
  • AMD Athlon 64 3300+
  • AMD Athlon 64 3200+
  • AMD Athlon 64 3000+
  • AMD Athlon 64 2800+

AMD Sledgehammer (2003)

  • AMD Athlon 64 FX-53
  • AMD Athlon 64 FX-51

Next Page > The Vulnerable AMD K10 and K8 Mobile CPUs

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


Vulnerable AMD K10 And K8 Mobile CPUs

AMD Llano (2011)

  • AMD A8-3550MX
  • AMD A8-3530MX
  • AMD A8-3520M
  • AMD A8-3510MX
  • AMD A8-3500M
  • AMD A6-3430MX
  • AMD A6-3420M
  • AMD A6-3410MX
  • AMD A6-3400M
  • AMD A4-3330MX
  • AMD A4-3320M
  • AMD A4-3310MX
  • AMD A4-3305M
  • AMD A4-3300M
  • AMD E2-3000M

AMD Champlain (2010)

  • AMD Phenom II X940 Black Edition
  • AMD Phenom II X920 Black Edition
  • AMD Phenom II N970
  • AMD Phenom II P960
  • AMD Phenom II N950
  • AMD Phenom II P940
  • AMD Phenom II N930
  • AMD Phenom II P920
  • AMD Phenom II N870
  • AMD Phenom II P860
  • AMD Phenom II N850
  • AMD Phenom II P840
  • AMD Phenom II N830
  • AMD Phenom II P820
  • AMD Phenom II N660
  • AMD Phenom II P650
  • AMD Phenom II N640
  • AMD Phenom II N620
  • AMD Phenom II X640 Black Edition
  • AMD Phenom II X620 Black Edition
  • AMD Athlon II N370
  • AMD Athlon II P360
  • AMD Athlon II N350
  • AMD Athlon II P340
  • AMD Athlon II N330
  • AMD Athlon II P320
  • AMD Athlon II Neo K145
  • AMD Athlon II Neo K125
  • AMD Turion II Neo K685
  • AMD Turion II Neo K665
  • AMD Turion II Neo K645
  • AMD Turion II Neo K625
  • AMD Turion II N570
  • AMD Turion II P560
  • AMD Turion II N550
  • AMD Turion II P540
  • AMD Turion II N530
  • AMD Turion II P520
  • AMD V160
  • AMD V140
  • AMD V120
  • AMD V105

AMD Geneva (2010)

  • AMD Turion II Neo N54L
  • AMD Turion II K685
  • AMD Turion II K665
  • AMD Turion II K645
  • AMD Turion II K625

AMD Caspian (2009)

  • AMD Turion II Ultra M660
  • AMD Turion II Ultra M640
  • AMD Turion II Ultra M620
  • AMD Turion II Ultra M600
  • AMD Turion II M560
  • AMD Turion II M540
  • AMD Turion II M520
  • AMD Turion II M500
  • AMD Athlon II M360
  • AMD Athlon II M340
  • AMD Athlon II M320
  • AMD Athlon II M300
  • AMD Sempron M140
  • AMD Sempron M120
  • AMD Sempron M100

AMD Conesus (2009)

  • AMD Athlon Neo X2 L510
  • AMD Athlon Neo X2 L335
  • AMD Athlon Neo X2 L325

AMD Sherman (2009)

  • AMD Athlon Neo TF-20
[adrotate group=”1″]

AMD Huron (2009)

  • AMD Athlon Neo MV-40
  • AMD Sempron 210U
  • AMD Sempron 200U

AMD Sable (2008)

  • AMD Sempron SI-42
  • AMD Sempron SI-40

AMD Sherman (2007)

  • AMD Mobile Sempron 4000+
  • AMD Mobile Sempron 3800+
  • AMD Mobile Sempron 3700+
  • AMD Mobile Sempron 3600+
  • AMD Sempron 2100+ fanless

AMD Keene (2006)

  • AMD Mobile Sempron 3600+
  • AMD Mobile Sempron 3500+
  • AMD Mobile Sempron 3400+
  • AMD Mobile Sempron 3200+

AMD Newark (2005)

  • AMD Mobile Athlon 64 4000+
  • AMD Mobile Athlon 64 3700+
  • AMD Mobile Athlon 64 3400+
  • AMD Mobile Athlon 64 3200+
  • AMD Mobile Athlon 64 3000+

AMD Albany (2005)

  • AMD Mobile Sempron 3600+
  • AMD Mobile Sempron 3400+
  • AMD Mobile Sempron 3300+
  • AMD Mobile Sempron 3100+
  • AMD Mobile Sempron 3000+

AMD Roma (2005)

  • AMD Mobile Sempron 3400+
  • AMD Mobile Sempron 3300+
  • AMD Mobile Sempron 3100+
  • AMD Mobile Sempron 3000+
  • AMD Mobile Sempron 2800+

AMD Oakville (2004)

  • AMD Mobile Athlon 64 3000+
  • AMD Mobile Athlon 64 2800+
  • AMD Mobile Athlon 64 2700+

AMD Georgetown (2004)

  • AMD Mobile Sempron 3300+
  • AMD Mobile Sempron 3100+
  • AMD Mobile Sempron 3000+
  • AMD Mobile Sempron 2800+
  • AMD Mobile Sempron 2600+

AMD Sonora (2004)

  • AMD Mobile Sempron 3100+
  • AMD Mobile Sempron 3000+
  • AMD Mobile Sempron 2800+
  • AMD Mobile Sempron 2600+

AMD Dublin (2004)

  • AMD Mobile Sempron 3000+
  • AMD Mobile Sempron 2800+
  • AMD Mobile Sempron 2600+

AMD Odessa (2004)

  • AMD Mobile Athlon 64 3000+
  • AMD Mobile Athlon 64 2800+
  • AMD Mobile Athlon 64 2700+

AMD Clawhammer (2004)

  • AMD Mobile Athlon 64 3700+
  • AMD Mobile Athlon 64 3400+
  • AMD Mobile Athlon 64 3200+
  • AMD Mobile Athlon 64 3000+
  • AMD Mobile Athlon 64 2800+
  • AMD Mobile Athlon 64 2700+

 

Meltdown + Spectre Reading Suggestions

[adrotate group=”2″]

Go Back To > First Page | Articles | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


KB4078130 : Emergency Windows Update To Disable Intel Spectre Patches!

You may recall our extensive coverage of Intel’s buggy Spectre 2 patches that were causing random and spontaneous reboots in over 800 CPU models. It’s gotten so bad that Microsoft was forced to issue KB4078130 – an emergency update to disable the Intel Spectre 2 mitigations that were causing the spontaneous reboots.

 

Spectre Variant 2

Colloquially known as Spectre 2, it is more accurately known as Spectre Variant 2Google Project Zero Variant 2 (GPZ Variant 2), or officially as CVE-2017-5715.

After deploying the Spectre 2 patches in their new microcode updates, Intel started receiving reports of “higher than expected reboots and other unpredictable system behaviour“.

Microsoft confirmed this, stating further that their “own experience is that system instability can in some circumstances cause data loss or corruption“.

 

KB4078130 : Update To Disable Mitigation Against Spectre, Variant 2

Unwilling to wait for Intel to fix the problem, Microsoft decided to issue KB4078130 – an “out of band” or emergency update. All it does is disable the mitigation against Spectre 2.

Their tests proved that this update is sufficient to prevent the random and spontaneous reboots experienced by the affected Intel processors.

[adrotate group=”2″]

The KB4078130 update covers the following Windows version :

  • Windows 7 SP1 (client and server variants)
  • Windows 8.1 (client and server variants)
  • Windows 10 (client and server variants)

 

Where To Download KB4078130

This update is not applied automatically because it’s meant only for Intel systems affected by these reboot issues.

You will need to download and install it manually at the Microsoft Update Catalog.

 

For Advanced Users Only

If you are a system administrator, or a 1337 techie, Microsoft is making available a new registry key to manually disable and re-enable the mitigation against Spectre 2.

  • Instructions for Windows administrators – KB4073119
  • Instructions for Windows Server administrators – KB4072698

Go Back To > Articles | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Whopper Neutrality – A Simple Guide To Net Neutrality

Confused about Net Neutrality? Thanks to Burger King’s viral Whopper Neutrality video, you can easily grasp the concept, and understand why all of your nerdy friends are so incensed with Ajit Pai, and his successful repeal of net neutrality.

 

Whopper Neutrality – A Simple Guide To Net Neutrality

Part advertisement for their Whopper burger, part explainer on net neutrality, the Whopper Neutrality video has amassed millions of views on YouTube and has gone viral on social media.

The Whopper Neutrality video starts with interviews of random people who were clueless about net neutrality, and its repeal. It then segued into a prank at a Burger King outlet, where customers were asked to pay extra if they wanted their Whoppers to be delivered faster.

In a hilarious reference to broadband speed in Mbps, Burger King staff members explained to confused customers that MBPS stood for “Making Burgers Per Second“, and how the price they pay determines how fast they get their Whoppers :

Slow MBPS : $4.99
Fast MBPS : $12.99
Hyperfast MBPS : $25.99

Obviously, their customers were not impressed. NOT IMPRESSED AT ALL when they learned they will have to wait 15-20 minutes for their Whoppers, unless they paid extra.

They became livid when they found out that the Whoppers were already made, and ready to be served. But because they refused to pay extra, they would have to wait for their Whoppers.

That is essentially what net neutrality aims to prevent – the right of Internet service providers to control how fast websites and services on the Internet load. In other words – those who want their content to load faster will have to pay these Internet service provider.

 

Net Neutrality

Net neutrality is not a new concept. It was coined by Columbia University professor Tim Wu in 2003, and it has been used by the FCC since 2004 to force Internet service providers to treat all Internet content equally.

The Obama Administration fought to preserve net neutrality, with President Obama recommending in 2014 that the FCC reclassify broadband Internet as a telecommunications service. This would make them equivalent to other telecommunications companies, subject to common carrier rules.

[adrotate group=”2″]

Then came with Trump Administration. One of the first things President Donald Trump did – appoint Ajit Pai, who is vehemently against net neutrality, as the Chairman of the FCC (Federal Communications Commission).

Calling the move “Restoring Internet freedom“, Ajit Pai began rolling back net neutrality, despite overwhelming support by the public for net neutrality to be maintained. He successfully achieved that end on 14 December 2017, when the FCC voted to repeal net neutrality.

Barring a change in the US Presidency, the only way to restore net neutrality would be to force the US Congress to enact legislation to protect net neutrality. If you’re a US citizen, write to your Congresspersons, and make sure they understand how much YOU value net neutrality.

You can also show your support for net neutrality by signing this petition.

Go Back To > Articles | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

The Apple Spectre + Meltdown Patches Detailed!

Within a week after the Meltdown and Spectre exploits revealed, the first Apple Spectre patches were introduced. And Apple has finally released their next slew of patches that will help protect Apple computers against Meltdown and Spectre.

There has been some confusion about what was “fixed” in which patch. In this article, we will share with you exactly mitigations were introduced in which OS X update. As usual, we will update this article, as and when new Apple Spectre or Meltdown patches are released.

 

The Apple Spectre + Meltdown Patches

macOS High Sierra 10.13.2 Supplemental Update

Date Of Introduction : 8 January 2018
Operating System Patched : macOS 10.13 High Sierra
GPZ Variant Addressed : Spectre 1 and 2 (CVE-2017-5753 and CVE-2017-5715)

The first known update was the macOS High Sierra 10.13.2 Supplemental Update. It introduced a number of mitigations against the two Spectre variants (CVE-2017-5753 and CVE-2017-5715). Specifically, several security improvements were made to Safari and WebKit.

After updating, Safari will be upgraded to version 11.0.2 (13604.4.7.1.6) or version 11.0.2 (13604.4.7.10.6).

 

Security Update 2018-001 Sierra

[adrotate group=”2″]

Date Of Introduction : 23 January 2018
Operating System Patched : macOS 10.12 Sierra
GPZ Variant Addressed : Meltdown (CVE-2017-5754)

This security update patched all versions of macOS Sierra against the Meltdown exploit (CVE-2017-5754).

 

Security Update 2018-001 El Capitan

Date Of Introduction : 23 January 2018
Operating System Patched : OS X 10.11 El Capitan
GPZ Variant Addressed : Meltdown (CVE-2017-5754)

This security update patched all versions of OS X El Capitan against the Meltdown exploit (CVE-2017-5754).

 

Outstanding Apple Spectre + Meltdown Patches

From what we understand, these are the likely Apple Spectre and Meltdown patches that are still outstanding, and will eventually be released :

  1. A Meltdown patch for macOS High Sierra
  2. Spectre mitigation patches for macOS Sierra and OS X El Capitan
  3. EFI firmware updates for various Mac computers

We will update this article, as and when new Apple Spectre or Meltdown patches are released.

Go Back To > Guides | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

YouTube Gets Ready To Kill Off Small & Budding Creators

YouTube is preparing to cut off monetisation opportunities for small and budding video creators. Those who don’t make their new requirements by 20 February 2018, will be removed from their YouTube Partner Program.

If you haven’t done so, please SUBSCRIBE to the Tech ARP YouTube channel. Thank you!

 

What Is The YouTube Partner Program?

The YouTube Partner Program allows video creators to earn some money off their work, by adding YouTube ads to their uploaded videos. They also earn money when YouTube Red subscribers watch their videos.

Not everyone can join the YouTube Partner Program. You have to meet their minimum requirements before you are allowed to start monetising the videos you upload to YouTube.

 

What Changed?

Back in April of 2017, YouTube set the eligibility requirement of 10,000 lifetime views. That means the videos in your channel must accumulate at least 10,000 views before you can start monetising them.

On 16 January 2018, they hiked up that eligibility requirement significantly, requiring your channel to have :

  • a minimum of 1,000 subscribers, and
  • at least 4,000 hours / 240,000 minutes watched in the previous 12 months

Those who are already in the YouTube Partner Program were given just 30 days to comply with those requirements, or get kicked off the program.

You can read more about the YouTube Partner Program changes in the next page.

 

The Problem With This Change

Racking up 4,000 hours or 240,000 minutes watched in the previous 12 months is not difficult. Even small-timers can hit that target, if they make good videos. They don’t have make many videos. They just have to make good videos that resonate with people.

The biggest problem creators will have is racking up 1,000 subscribers. It is arguably easy for those who focus on light, fun material… and difficult for those who choose weightier material. In other words – kitten videos will get more subscribers than videos on social issues and even technology.

The minimum subscriber requirement will likely push new and budding video creators to shift to mass appeal content (fake news, cat videos and pranks), and lower quality but more frequent content.

 

Why Did YouTube Make These Changes?

In a blog post, they listed out some reasons:

  • We’ve arrived at these new thresholds after thorough analysis and conversations with creators like you.
  • They will allow us to significantly improve our ability to identify creators who contribute positively to the community and help drive more ad revenue to them (and away from bad actors).
  • These higher standards will also help us prevent potentially inappropriate videos from monetizing which can hurt revenue for everyone.

Notwithstanding our opinions on the change, we find those reasons rather ludicrous :

  • We have no idea who YouTube was talking to, since we never received a survey to opine on the matter. They were probably only talking to their top creators.
  • We find their focus on identifying “creators who contribute positively to the community” ironic since they don’t seem to punish those who spread fake news, and some of their biggest stars (like Logan Paul) continue to get rich on YouTube by being assholes.
  • Subscription numbers and watch times are measures of POPULARITY, not QUALITY or VALUE to the community. That’s why Logan Paul has almost 16 million subscribers, while CNN only has just over 2.6 million subscribers.

 

YouTube : They’re Not Making Much Money Anyway

YouTube pointed out that “99% of those affected were making less than $100 per year in the last year, with 90% earning less than $2.50 in the last month“.

In our opinion, that is a perfectly legit reason. Why should YouTube spend resources serving ads to low traffic channels? Besides, it won’t matter much to them since they earn so little.

That is why we personally have no issues with YouTube’s new requirement of 4,000 watch hours. That’s similar to their previous requirement of 10,000 views, just set to a much higher level.

 

The Subscriber Requirement Is Unfair & Pointless

The only change we feel is grossly unfair to small and budding creators is the requirement to have 1,000 subscribers. This requirement penalises those who don’t have a prolific output, because people are less likely to subscribe to a channel with low frequency of updates.

Yet it doesn’t mean that these small or budding creators can’t create videos that appeal to many people, and get hundreds of thousands of views. Take, for example, this video on a LEGO Nexo Knights exhibition by The Rojak Pot.

There is no doubt that this video contributes “positively to the community“. It’s certainly not Blade Runner, but we do believe it’s a far more “positive” contribution to the community, than the crap Paul Logan serves to his 15+ million subscribers.

That video alone racked up over 3,100 watch hours and almost 150,000 views. If we posted just two of such videos, we would more than meet the minimum requirement for watch hours.

Yet The Rojak Pot’s YouTube channel has just 307 subscribers. That is nowhere close to meeting the new requirement for monetisation. In other words – all of their videos will cease to generate income, even if they rack up hundreds of thousands of views.

 

Our Personal Opinion

Personally, we think that a minimum requirement for VIEWS or WATCH HOURS is a good idea. YouTube should not have to spend resources on low-traffic channels.

The minimum requirement for SUBSCRIBERS, on the other hand, is not only unfair, it does not help them identify “creators who contribute positively to the community“.

[adrotate group=”2”]

It only incentivises the community to focus on fluff and nonsensical but entertaining videos. Remember how Logan Paul has SIX TIMES as many subscribers as CNN?

If YouTube drops the subscriber requirement, they will free small and budding creators to focus on creating better videos. It will also allow them to focus on the community niches that interest them, rather than trying to appeal to as many people as possible.

YouTube should want a diverse range of creators focused on different niches, rather than a more homogenous group of creators making basically the same type of content – all designed for mass appeal.

If you haven’t done so, please SUBSCRIBE to the Tech ARP YouTube channel. Thank you!

Next Page > The YouTube Partner Program Changes & Blog Post

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


The YouTube Partner Program Changes

On January 16, 2018, we announced new eligibility requirements for the YouTube Partner Program. Previously, the requirement to join the YouTube Partner Program was 10,000 lifetime views. Now, once a channel reaches 4,000 watch hours in the previous 12 months and 1,000 subscribers it will be reviewed to join the program.

If your application is currently pending review

The new requirement applies to channels that are currently awaiting review to be in the YouTube Partner Program:

  • If you meet the new threshold, your pending application will be reviewed in the next few weeks.
  • If you do not yet meet the new threshold, your application will be reviewed once your channels reaches 4,000 watch hours in the previous 12 months and 1,000 subscribers (the new threshold).

If you’re currently part of the YouTube Partner Program

The new requirement applies to existing channels who are currently part of the YouTube Partner Program:

  • If your channel meets the threshold, you will remain in the YouTube Partner Program.
  • If your channel is below the threshold, you’ll have until February 20, 2018, before your channel is removed from the YouTube Partner Program. The YouTube Creator Academy has many tips on building your channel, such as how to make great original content and growing your audience.
  • If your channel reaches the new threshold by February 20, 2018, you will automatically stay in the program (you do not need to re-apply).

If you haven’t done so, please SUBSCRIBE to the Tech ARP YouTube channel. Thank you!

[adrotate group=”1″]

 

Additional Changes to the YouTube Partner Program (YPP) to Better Protect Creators

by Neal Mohan, Chief Product Officer and Robert Kyncl, Chief Business Officer

2017 marked a tough year for many of you, with several issues affecting our community and the revenue earned from advertising through the YouTube Partner Program (YPP). Despite those issues more creators than ever are earning a living on YouTube, with the number of channels making over six figures up over 40% year-over-year. In 2018, a major focus for everyone at YouTube is protecting our creator ecosystem and ensuring your revenue is more stable.

As Susan mentioned in December, we’re making changes to address the issues that affected our community in 2017 so we can prevent bad actors from harming the inspiring and original creators around the world who make their living on YouTube. A big part of that effort will be strengthening our requirements for monetization so spammers, impersonators, and other bad actors can’t hurt our ecosystem or take advantage of you, while continuing to reward those who make our platform great.

Back in April of 2017, we set a YPP eligibility requirement of 10,000 lifetime views. While that threshold provided more information to determine whether a channel followed our community guidelines and policies, it’s been clear over the last few months that we need a higher standard.

Starting today we’re changing the eligibility requirement for monetization to 4,000 hours of watchtime within the past 12 months and 1,000 subscribers. We’ve arrived at these new thresholds after thorough analysis and conversations with creators like you. They will allow us to significantly improve our ability to identify creators who contribute positively to the community and help drive more ad revenue to them (and away from bad actors). These higher standards will also help us prevent potentially inappropriate videos from monetizing which can hurt revenue for everyone.

On February 20th, 2018, we’ll also implement this threshold across existing channels on the platform, to allow for a 30 day grace period. On that date, channels with fewer than 1,000 subs or 4,000 watch hours will no longer be able to earn money on YouTube. When they reach 1,000 subs and 4,000 watch hours they will be automatically re-evaluated under strict criteria to ensure they comply with our policies. New channels will need to apply, and their application will be evaluated when they hit these milestones.

Though these changes will affect a significant number of channels, 99% of those affected were making less than $100 per year in the last year, with 90% earning less than $2.50 in the last month. Any of the channels who no longer meet this threshold will be paid what they’ve already earned based on our AdSense policies. After thoughtful consideration, we believe these are necessary compromises to protect our community.

Of course, size alone is not enough to determine whether a channel is suitable for monetization, so we’ll continue to use signals like community strikes, spam, and other abuse flags to ensure we’re protecting our creator community from bad actors. As we continue to protect our platform from abuse, we want to remind all of you to follow YouTube’s Community Guidelines, Monetization Basics & Policies, Terms of Service, and Google AdSense program policies, as violating any of these may lead to removal from the YouTube Partner Program.

While this change will tackle the potential abuse of a large but disparate group of smaller channels, we also know that the bad action of a single, large channel can also have an impact on the community and how advertisers view YouTube. We’ll be working to schedule conversations with our creators in the months ahead so we can hear your thoughts and ideas and what more we can do to tackle that challenge.

One of YouTube’s core values is to provide anyone the opportunity to earn money from a thriving channel, and while our policies will evolve over time, our commitment to that value remains. Those of you who want more details around this change, or haven’t yet reached this new 4,000 hour/1,000 subscriber threshold can continue to benefit from our Creator Academy, our Help Center, and all the resources on the Creator Site to grow your channels.

Even though 2017 was a challenging year, thanks to creators like you, it was full of the moments that make YouTube such a special place. Creators large and small, established and emerging, transformed their talent and originality into videos that captivated over a billion people around the world. They made us laugh, taught us about our world and warmed our hearts. We’re confident the steps we’re taking today will help protect and grow our inspiring community well into the future.

If you haven’t done so, please SUBSCRIBE to the Tech ARP YouTube channel. Thank you!

Go Back To > First PageArticles | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


These Windows 10 Updates Are Bricking AMD PCs! Rev. 4.0

Microsoft has stopped pushing a number of Windows 10 updates, including the Meltdown and Spectre mitigation patches, because they were bricking some AMD PCs. Frustrated users were left with their AMD PCs in an unbootable state after installing those updates. The cure was, in this case, worse than the disease!

Updated @ 2018-01-16 : Added another affected CPU, a new section on Microsoft’s confusing statement, and a new section on what you should do.

Updated @ 2018-01-15 : Added 6 more CPUs affected by these Windows 10 updates, as well as the official word from AMD.

Updated @ 2018-01-11 : Added more AMD CPUs that were reported to have failed to boot up, after applying these Meltdown and Spectre patches.

Originally posted @ 2018-01-10

 

These Windows 10 Updates Are Bricking AMD PCs!

Following reports of users unable to boot up their AMD PCs after applying Windows 10 updates, Microsoft has identified the following security patches and updates from 3-9 January 2018 as the culprits :

January 3, 2018—KB4056897 (Security-only update)
January 9, 2018—KB4056894 (Monthly Rollup)
January 3, 2018—KB4056888 (OS Build 10586.1356)
January 3, 2018—KB4056892 (OS Build 16299.192)
January 3, 2018—KB4056891 (OS Build 15063.850)
January 3, 2018—KB4056890 (OS Build 14393.2007)
January 3, 2018—KB4056898 (Security-only update)
January 3, 2018—KB4056893 (OS Build 10240.17735)
January 9, 2018—KB4056895 (Monthly Rollup)

In the affected AMD systems, the Windows logo will appear after the PC reboots to complete the upgrade process. However, it won’t complete the boot process.

 

What AMD CPUs Are Affected? Updated!

Neither Microsoft nor AMD have revealed what AMD CPUs are affected but based on user reports, here is a list of affected AMD CPUs.

  • AMD Ryzen Threadripper 1950X
  • AMD Ryzen 7 1700
  • AMD FX-8350
  • AMD A10-7800
  • AMD FX-6350
  • AMD Phenom II X6 Black Edition 1090T
  • AMD Opteron 180
  • AMD Athlon X2 5050e
  • AMD Athlon X2 4850e
  • AMD Athlon X2 4450B
  • AMD Athlon X2 L310
  • AMD Athlon 64 X2 6400+
  • AMD Athlon 64 X2 6000+
  • AMD Athlon 64 X2 5600+
  • AMD Athlon 64 X2 5400+
  • AMD Athlon 64 X2 5200+
  • AMD Athlon 64 X2 5000+
  • AMD Athlon 64 X2 4600+
  • AMD Athlon 64 X2 4400+
  • AMD Athlon 64 X2 4200+
  • AMD Athlon 64 X2 4000+
  • AMD Athlon 64 X2 3800+
  • AMD Athlon 64 X2 3200+
  • AMD Athlon 64 X2 TK-57
  • AMD Athlon 64 X2 TK-55
  • AMD Athlon 64 FX-62
  • AMD Athlon 64 FX-60
  • AMD Athlon 64 1640B
  • AMD Sempron 3200+
  • AMD Turion Neo X2 L625
  • AMD Turion 64 X2 TL-60
  • AMD Turion 64 X2 TL-56
  • AMD Turion X2 RM-72
  • AMD Turion X2 RM-70

There has been at least one case each involving the newer Ryzen 7 and Threadripper processors, but these are outliers. So far, this issue affects mostly older AMD Athlon processors. However, there

Needless to say, the list above is NOT EXHAUSTIVE. We will update the list, as and when, people report them.

On 11 January 2018, AMD stated that the problem affected AMD Opteron, Athlon and Turion X2 Ultra processors.

 

How Did This Happen?

Microsoft is blaming documentation from AMD, stating that some AMD chipsets do not conform to the documentation previously provided to Microsoft to develop the Windows operating system mitigations to protect against the chipset vulnerabilities known as Spectre and Meltdown.

Technically, Meltdown and Spectre are CPU, not chipset, vulnerabilities. So Microsoft was probably referring to CPU documentation provided by AMD.

 

What Is Being Done?

Because Windows 10 forcibly installs updates, Microsoft has temporarily stopped pushing those Windows 10 updates to the affected AMD processors. They’re now working with AMD to correct the problem with those patches.

According to AMD, the new patches will be issued sometime in the week of 15-21 January 2018. At the time of this update (16 January 2018), the new patches have not been released.

 

Microsoft’s Confusing Statement New!

[adrotate group=”2″]

Microsoft invited some confusion when they stated on 11 January 2018 that “Microsoft has resumed updating the majority of AMD devices with the Windows operating system security update to help protect against the chipset vulnerabilities known as Spectre and Meltdown.

As far as we can tell – they only resumed Windows 10 updates for the AMD CPUs that are NOT affected by this problem. They merely identified the affected subset of AMD CPUs, and only blocked updates to them – “A small subset of older AMD processors remain blocked to avoid users getting into an unbootable state after installation of recent Windows operating system security updates.

 

Should You Install Windows 10 Updates? New!

As Microsoft claims to have accurately determined which subset of AMD CPUs are affected, it is theoretically safe to continue installing Windows 10 updates. Windows 10 should be able to identify your CPU and block the updates if it’s one of the affected models.

That said, there is still NO RISK of a Meltdown or Spectre attack. For all of the hype and panic, there are no know exploits of the speculative execution bug in the wild. The Meltdown and Spectre exploits also require physical access to the system.

So we still think it is better to be safe than sorry and HOLD OFF your Windows 10 updates, if you have an OLDER AMD CPU, until Microsoft releases the proper patches in the next few days.

 

Meltdown + Spectre Reading Suggestions

Go Back To > Articles | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

AMD CPUs Are Also Vulnerable To Spectre 2 Exploit Rev. 2.0

AMD updated their security advisory, confirming that their CPUs are also vulnerable to the Spectre 2 exploit. We updated our article Everything On The Intel, AMD & ARM CPU Bug, but it looks like many AMD fanboys still insist that AMD processors are only affected by Spectre 1. So let us burst their bubble and update them on what AMD actually said about this “issue”.

Updated @ 2018-01-15 : Added two new sections addressing the criticisms of the AMD and Intel fanboys.

Originally posted @ 2018-01-13

 

AMD CPUs Are Also Vulnerable To Spectre 2 Exploit

When AMD first released their security advisory on the Meltdown and Spectre exploits, they stated that, “Differences in AMD architecture mean there is a near zero risk of exploitation of this variant.

Just over a week later, on 11 January 2018, Mark Papermaster, AMD Senior Vice President and Chief Technology Officer, posted an update of their assessment, stating that “GPZ Variant 2 (Branch Target Injection or Spectre) is applicable to AMD processors.

He clarified that while AMD believes that their “processor architectures make it difficult to exploit Variant 2“, they have defined “a combination of processor microcode updates and OS patches” to mitigate the Spectre 2 threat.

You can read more about the Spectre and Meltdown exploits in Everything On The Intel, AMD & ARM CPU Bug.

 

Why Is Spectre 2 Important?

This development is significant, because Spectre 2 is the more problematic exploit of the two. Mainly because any efforts to reduce its risks significantly reduces performance.

According to Microsoft, only Spectre 2 mitigation patches have a significant performance impact. Their initial performance tests show that Spectre 1 and Meltdown mitigation patches have minimal or small performance impact, and are unlikely to be noticed by users.

 

What Is AMD Doing About Spectre 2?

AMD has already defined the “additional steps” that consists of processor microcode updates and operating system patches that will mitigate the threat of Spectre 2 to their affected processors.

They will make the microcode updates available for the Ryzen and EPYC processors this week, with microcode updates for older processors in the coming weeks.

Notably, Mark said that they would be OPTIONAL. This ties in with their assessment that it would be difficult (albeit not impossible) to exploit Variant 2 in an AMD processor. So AMD users will get the option of NOT applying these microcode updates, at least while no actual Spectre threat exists in the real world.

Linux vendors have started to roll out Spectre 2 patches, while Microsoft will be releasing Spectre 2 patches for Windows shortly.

 

AMD Fanboys Are Missing The Big Picture

Many AMD fanboys say that we are biased against AMD, because that the risk of a Spectre 2 exploit is small or “virtually non-existent”.

We love the AMD Ryzen just like you do, and find their performance-value proposition incredibly refreshing. In fact, we even wrote an article crediting The Ryzen Effect for creating better Intel processors.

What we reported is no different from the official statement by Mark Papermaster – the AMD CPUs are vulnerable to Spectre 2. But you are all missing the big picture.

[adrotate group=”2″]

The point here isn’t to rub our collective noses in some kind of childish Intel vs. AMD fanboy war, it’s to point out that these Spectre 2 patches will have a significant performance impact.

Because there is no real world exploit of both Meltdown and Spectre, and because AMD’s microarchitecture is more robust against the Spectre 2 vulnerability, there is arguably no real need to apply the Spectre 2 patches.

That’s why we specifically pointed out that “Mark said that they would be OPTIONAL“, so you should have the option of “NOT applying these microcode updates“.

You guys would have realised that if you actually read the article, instead of just stopping at the title.

 

Intel Fanboys Should Stop Throwing Stones

Some Intel fanboys are using this article as evidence that “AMD got caught lying” or “AMD CPUs are just as bad”. Well, let us address those claims.

  1. AMD did not lie – In their original disclosure, they stated very clearly that “there is a near zero risk” of a Spectre 2 exploit working on an AMD CPU. We specifically mentioned and underlined that in the original article to stress that AMD was already aware that their CPUs are somewhat vulnerable to Spectre 2.
  2. AMD CPUs are far less at risk – Even with this upgraded risk assessment, AMD CPUs are still much less vulnerable to Spectre 2 than Intel CPUs, and they are completely impervious to the Meltdown exploit. Because they are less vulnerable, AMD users have the option of not applying Spectre 2 patches that can have a significant performance impact.

 

Meltdown + Spectre Reading Suggestions

Go Back To > Articles | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

The NVIDIA GeForce NOW Free Beta Details Revealed!

Thanks to NVIDIA GeForce NOW, your underpowered PC can now let you play games as if it is powered by a high-performance GeForce GTX graphics card! And best of all, NVIDIA is now offering GeForce NOW as a free beta for Windows and Mac desktops and laptops!

 

What Is NVIDIA GeForce NOW?

NVIDIA GeForce NOW is a game-streaming service that connects your Windows or macOS computer to supercomputers in the cloud that stream 1080p graphics at up to 120 frames per second!

Since all of the graphics processing happens in NVIDIA’s data centers, you can now play the latest PC games even on PCs with low performance integrated graphics. All you have to do is connect to your game library on digital stores like Uplay PC and Steam, and start playing!

 

Always Updated, Always Expanding

NVIDIA GeForce NOW receives regular updates, including service enhancements, new games and additional data centers. In fact, the 10th NVIDIA GeForce NOW data center was recently opened in Amsterdam.

GeForce NOW also handles your system maintenance tasks, ensuring that patches and driver updates are installed automatically. It also enables cloud saves for cross-platform play.

 

The Free Public Beta Details

[adrotate group=”2″]

NVIDIA GeForce NOW is currently available as a free public beta for Windows and Mac desktops and laptops in most of North America and Europe.

The app has been localized in French and German, with local language support for many top and diverse gaming experiences including PLAYERUNKNOWN’S BATTLEGROUNDS, Arma 3, Garry’s Mod, Fortnite, and more.

Due to the overwhelming demand, there is currently a waitlist to give the free public beta a try. You can get yourself on the waitlist!

Go Back To > News | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Pre-2016 Intel CPUs Hit Worst By Meltdown + Spectre Fix

Microsoft just revealed that pre-2016 Intel CPUs will be hit worst by the Meltdown and Spectre patches. They also pointed out that the performance impact detailed in benchmarks published so far did not include both operating system and silicon updates, and are therefore, inaccurate.

Microsoft is still working on their own set of benchmarks that will look at the performance impact after both operating system and silicon updates have been applied. In the meantime, Terry Myerson, Executive Vice President of the Windows and Devices Group, shared some preliminary findings.

 

Performance Impact Of The Meltdown + Spectre Patches

According to Terry, the patches for Variant 1 (Spectre 1) and Variant 3 (Meltdown) of the speculative execution bug have minimal performance impact.

It is the Variant 2 (Spectre 2) patches, both operating system and silicon microcode, that have a significant performance impact.

Here is a summary of what Microsoft has found so far :

Windows 10 With 2016 Or Newer Intel CPUs

Intel CPU Models : Intel Skylake, Intel Kaby Lake, Intel Coffee Lake

Performance Impact : Single digit reduction in performance. Microsoft does not expect most users to notice the impact, because the percentages are “reflected in milliseconds“.

Windows 10 With Pre-2016 Intel CPUs

Intel CPU Models : Intel Broadwell, Intel Haswell, Intel Ivy Bridge, Intel Sandy Bridge, or older.

Performance Impact : Significant slowdowns in some benchmarks. Microsoft expects some users to notice the decrease in performance.

Windows 8 and Windows 7 With Pre-2016 Intel CPUs

Intel CPU Models : Intel Broadwell, Intel Haswell, Intel Ivy Bridge, Intel Sandy Bridge, or older.

Performance Impact : Significant slowdowns. Microsoft expects most users to notice the decrease in performance.

Windows Server On Any Intel CPU

Performance Impact : Significant slowdowns in any IO-intensive application.

 

Why The Difference In Performance Impact?

In the newer Intel processors (from the 2016 Skylake onwards), Intel refined the instructions used to disable branch speculation to be more specific to indirect branches. This reduces the performance impact of Spectre mitigation patches.

There is a larger performance impact with Windows 8 and Windows 7 because they have more user-kernel transitions. For example, all font rendering takes place in the kernel.

 

What Should You Do?

If you are using a newer Intel CPU like the Core i7-8700K with Windows 10, you can rest easy knowing that the performance impact of the Meltdown and Spectre patches to be minimal.

If you are using a newer Intel CPU with an older operating system like Windows 8 or Windows 7, you should consider upgrading to Windows 10. This would reduce the performance impact of the Meltdown and Spectre patches.

[adrotate group=”2″]

If you are using a pre-2016 Intel CPU with Windows 10, there is nothing much you can do except consider upgrading to a newer processor. You could possibly live with the performance impact of the Meltdown and Spectre patches.

If you are using a pre-2016 Intel CPU with an older operating system like Windows 8 or Windows 7, you can try upgrading to Windows 10 to reduce the performance impact of the Meltdown and Spectre patches.

If you are managing a Windows Server that uses Intel CPUs, you will need to balance the risk of leaving each Windows Server instance unprotected, against the significant performance impact of protecting it against Meltdown and Spectre.

 

Meltdown + Spectre Reading Suggestions

Go Back To > Articles | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


My Knox Is Dead. Long Live Samsung Secure Folder!

Samsung announced in June 2017 that they were killing off My Knox, replacing it with Samsung Secure Folder that ships with the Samsung Galaxy S8 / S8 Plus and Galaxy Note8 smartphones.

Secure Folder is compatible with the Samsung Galaxy S7 and Galaxy S7 edge smartphones that have been upgraded to Android 7.0 Nougat.

Updated @ 2017-12-22 : Revamped the article, adding a migration guide, and a final email from Samsung.

Updated @ 2017-11-16 : Added a new email from Samsung with a confirmed end-of-service date for My Knox.

Originally posted @ 2017-06-07

 

Samsung Kills My Knox

In early June 2017, Samsung announced that they’re killing My Knox, and replacing it with Secure Folder. The end-of-life date was set for 19 December 2017.

Beginning 20 December 2017, the My Knox app would no longer be available to download from the Google Play Store. The My Knox portal will also be disabled – you won’t be able to login.

Samsung replaced My Knox with their new Secure Folder solution. They promise that it is a superior solution.

 

Samsung Secure Folder

Samsung Secure Folder is a new security solution that leverages the defense-grade Samsung Knox security platform to create a private, encrypted space on a Samsung Galaxy smartphone running on Android 7.0 Nougat or better.

It is available in the Samsung Galaxy S8 / S8 Plus and Galaxy Note8 smartphones, but can be downloaded and installed in the Samsung Galaxy S7 and Galaxy S7 edge smartphones that have been upgraded to Android 7.0 Nougat.

As no Mobile Device Management (MDM) is required, it is suitable for both personal and business usage. Here are additional details :

  • Apps and data can be installed or created within Secure Folder, or moved there from outside.
  • Apps and data moved to Secure Folder are kept separate, leveraging SE for Android – preventing unauthorized communication between apps inside and outside.
  • Application data and files are encrypted with defense-grade Sensitive Data Protection (SDP) technology – using 256-bit AES cipher algorithm to secure data.
  • Data remains encrypted even after the user has exited Secure Folder or has turned off the device, and is decrypted when a user successfully authenticates himself / herself.

It can also be used alongside Knox Workspace, enabling two Knox container solutions at the same time.

This allows users to have access to both a dedicated work environment (Knox Workspace), as well as a secure personal area (Secure Folder).

[adrotate group=”1″]

 

How To Migrate From My Knox To Secure Folder

Fortunately, Samsung made it easy to migrate your private data from My Knox to Secure Folder. Here are the steps :

  • Log into the My Knox app
  • Go to My Knox Settings, and select Backup and restore.
  • Backup your My Knox data (you’ll need a Samsung account to do this).
  • Install and setup Secure Folder, if you have not already done so.
  • Log into Secure Folder.
  • Go to Secure Folder Settings, and select Backup and restore.
  • Select Restore (using the same Samsung account), and you’re done!

if you are worried about the dangers of backing up your encrypted data to the cloud (it is encrypted!), you can use this alternative method :

  • Log into the My Knox app.
  • Copy the data out into the Samsung smartphone, or a secure computer
  • Install and setup Secure Folder, if you have not already done so.
  • Move the data into Secure Folder.

 

Samsung My Knox Termination Chronology

In early June 2017, Samsung sent out this email to all registered Samsung users :

First Samsung warning about terminating My Knox

My Knox will no longer be available on new Samsung devices in 2017. You may continue your secure space experience by setting up Secure Folder, available now from Galaxy Apps.

Secure Folder runs on Android N OS or higher versions only. It leverages the defence-grade Samsung Knox security platform to create a private, encrypted space on your Samsung Galaxy phone. Applications and data moved to Secure Folder are partitioned separately on the device and gain an additional layer of security and privacy.

To seamlessly transfer your private content between solutions, please back up your My Knox data and restore it to Secure Folder. To back up your My Knox data, go to My Knox settings > Backup and restore. Remember, a Samsung account is required to use this feature.

You can restore the backup data after setting up Secure Folder. Go to Secure Folder settings > Backup and restore > Restore.

You may use My Knox until its end-of-service date (which will be announced soon). However, be aware that we will not be actively maintaining the service or adding new features.

This was followed by this email on 15 November 2017, revealing its end-of-service date as 19 December 2017.

Samsung confirms end-of-life date for the My Knox service

Dear customers,

Thank you for using My Knox.

As previously announced, we will end support for My Knox on 19th December 2017. You will not be able to download My Knox from any app store after the end-of-service date.

You may use My Knox on your mobile device until you uninstall the application. However, you will be unable to log in to the My Knox portal to remotely manage your device (e.g. to reset your My Knox password or unlock My Knox).

If you have a phone that runs the Android N OS, we recommend transferring your private data in My Knox to Secure Folder, available at Google Play or Galaxy Apps, and on new Samsung phones such as the Galaxy Note 8. We also recommend backing up your My Knox data first, and restoring the data after you set up Secure Folder.

To back up My Knox data, go to My Knox Settings > Backup and restore > Back up My Knox data. Please note that a Samsung account is required to use the My Knox backup and restore feature.

If your phone does not support Secure Folder, then please back up the content to outside My Knox (e.g. using the Move to Personal mode feature).

For more information regarding My Knox termination, please visit My Knox FAQ .

We hope you have enjoyed your experience with My Knox. Samsung is committed to continuous innovation to provide you with the highest-quality products and services.

This final email was sent on 20 December 2017, noting that My Knox is now terminated :

The final Samsung email on the termination of the My Knox service

Dear customers,

Thank you for using My Knox.

As previously announced, we will terminate the My Knox service on 19th December 2017. You will not be able to download My Knox from any app store from then on. You will also be unable to log in to the My Knox portal to remotely manage your device.

You may use My Knox on your mobile device until you uninstall the application. However we highly recommend you to back up your data or move it to outside My Knox.

If your phone supports Secure Folder, we recommend transferring your private data in My Knox to Secure Folder, available at Google Play or Galaxy Apps, and on new Samsung phones such as the Galaxy Note 8. We also recommend backing up your My Knox data first, and restoring the data after you set up Secure Folder.

To back up My Knox data, go to My Knox Settings > Backup and restore > Back up My Knox data. Please note that a Samsung account is required to use the My Knox backup and restore feature.

However, if your phone does not support Secure Folder, then please back up the content to outside My Knox (e.g. using the Move to Personal mode feature).

We hope you have enjoyed your experience with My Knox. Thank you for using our service.

 

Recommended Reading

Go Back To > Mobile Devices | SoftwareHome

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


The ASUS ZenFone Max Plus M1 Revealed!

ASUS just revealed the ASUS ZenFone Max Plus M1 smartphone, which boasts a 5.7″ full-screen display with a 18:9 aspect ratio and a dual-lens camera system. Here is everything you need to know about the new ASUS ZenFone Max Plus M1 smartphone!

 

The ASUS ZenFone Max Plus M1 (ZB570TL)

Also known as the ASUS Pegasus 4S in China, the ASUS ZenFone Max Plus M1 has a model number of ZB570TL or ASUS X018D. It has a 18:9 ultra-wide screen display, and a 81.5% screen-to-body ratio. This allows ASUS to fit a 5.7″ display into a 5.2″ form factor.

It is powered by an mid-range MediaTek MT6750T SoC, and comes with 4GB of RAM and up to 64GB of storage. It also has a dedicated slot for a microSD card (up to 256GB), and two nanoSIM slots. All of that is powered by a 4,130 mAh battery with reverse charging capability.

Like the ZenFone 4 Max Pro, the ZenFone Max Plus has a dual-lens camera at the back. But this time, ASUS chose to use a 16 MP + 8 MP combo. The main camera has a 16 MP sensor with f/2.0 lens, while the wide-angle camera has an 8 MP sensor with 120° lens.

Instead of a 16 MP camera in the ZenFone 4 Max Pro, ASUS went with an 8 MP front camera with f/2.2 lens in the ZenFone Max Plus.

 

The ASUS ZenFone Max Plus M1 Specifications

SpecificationsASUS ZenFone 4 Max Plus M1
ModelZB570TL
Display5.7" Full HD+ display with 2.5D curved edge
- 720 x 1440 pixels
Operating SystemZenUI 4.1 (Android 7.0)
System PlatformMediaTek MT6750T
Processor4 x ARM Cortex-A53 cores (1.5 GHz)
4 x ARM Cortex-A53 cores (1.0 GHz)
Graphics ProcessorARM Mali-T860 MP2 (650 MHz)
Memory4 GB LPDDR3 memory (833 MHz)
Storage32 GB GB internal storage
microSD card option (up to 256 GB)
Front Camera8 MP sensor with f/2.0 lens
Rear CameraDual Lens Camera System
- 16 MP sensor with f/2.0 6P lens
- 8 MP sensor with 120° lens
Connectivity4G : LTE Cat6
WiFi : 802.11b/g/n
Bluetooth 4.0
USB : microUSB 2.0
SIM CapabilityDual SIM, Dual Standby capability
Dual Nano SIM cards
Fingerprint SensorYes, Rear-mounted
GPSYes, with AGPS and Beidou
Battery4,130 mAh lithium-ion battery
- with Reverse Charging feature
Dimensions72.7 mm wide
152.6 mm tall
8.8 mm thick
Weight160 g

 

Price & Availability

Locally, the ASUS ZenFone Max Plus M1 was just approved by SIRIM, but ASUS confirmed that it will be ready for purchase / delivery starting 20 December 2017. In the meantime, you can pre-order the ZenFone Max Plus M1 at a very, very special price.

The ASUS ZenFone Max Plus M1 will have a recommended retail price of RM 899 / ~US$ 219. But during the pre-order period, ASUS will offer a limited quantity with a discount or Lazada coupon worth RM 200 / ~US$ 49!

[adrotate group=”2″]

Offline Pre-Order Offer

Duration : 14-19 December 2017
Collection : 20 December 2017
Offer : Get a RM 200 rebate when you trade in a mobile phone (working or non-working). A deposit of RM 100 will have to be placed.

Lazada Pre-Order Offer

Duration : 14-19 December 2017
Collection : 22 December 2017
Offer : Get a RM 200 Lazada discount voucher when you purchase the ZenFone Max Plus M1 using this pre-order purchase link. trade in a mobile phone (working or non-working). Each account can only purchase a maximum of two (2) units.

Go Back To > Articles | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


The AMD Radeon Software Adrenalin Edition Tech Report

AMD has been on a yearly update cycle of Radeon Software, ever since they introduced the first version – Crimson Edition on 2 November 2015. This was followed by the Crimson ReLive Edition on 9 December 2016. On 12 December 2017, they introduced the third iteration – Radeon Software Adrenalin Edition.

In addition to enhanced performance, there are over 30 new or improved features in Adrenalin Edition. So join us for a tour of what’s new and what’s improved in the new AMD Radeon Software Adrenalin Edition!

 

AMD Radeon Software Adrenalin Edition

The AMD Radeon Software Adrenalin Edition is named after the Adrenalin Rose, not the hormone adrenaline (also known as epinephrine). That’s Adrenalin without the e. The Adrenalin Rose is a rich velvet red rose with long thornless stems and deep green foliage.

Before we go into the details, here is a summary of the new features being introduced in Radeon Software Adrenalin Edition :

Radeon Overlay

Radeon Overlay allows gamers to fine-tune their game experience, and monitor, record and share their gameplay without ever leaving the game. It provides one-click access to Radeon ReLive, Performance Monitoring, Radeon Chill, Frame Rate Target Control (FRTC), Radeon FreeSync and Color settings.

AMD Link Mobile App

Available for Android and iOS platforms, the AMD Link is a mobile app that complements Radeon Software on the desktop, at home as a convenient second screen, or on the go. The AMD Link dashboard features streaming and replay with Radeon ReLive, GPU and PC performance monitoring, an AMD news feed, and notifications for new driver releases.

Improved Radeon Software Core Technologies

Radeon ReLive : Radeon ReLive now includes a chat integration feature that allows gamers to engage with their communities while streaming on Facebook, Twitch, Mixer, YouTube, Weibo and more.

Radeon Chill : With Radeon Software Adrenalin Edition, Radeon Chill now supports games based on the Vulkan API, along with DirectX 9, 10, 11, and 12.

Radeon WattMan : With Radeon Software Adrenalin Edition, custom GPU profiles can be saved, reloaded at a later point and shared with the Radeon user community

Enhanced Sync : With improved compatibility and an even wider field of view, Enhanced Sync extends its support to Vulkan API-based games, Radeon GCN architecture-based products, Multi-GPU and AMD Eyefinity Technology.

 

Operating System Support

The AMD Radeon Software Adrenalin Edition will support Windows 10 and Windows 7. AMD no longer supports Windows 8, but says that the Windows 7 driver works perfectly fine in Windows 8.

 

The Adrenalin Edition In Detail

If you want more in-depth details on Radeon Software Adrenalin Edition, we split them up into separate sections :

[adrotate group=”2″]

Next Page > Performance Boost, BWMG Support, FRTC Vulkan Support, Compute Profiles, Linux Support

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

The Adrenalin Edition Performance Boost

The Adrenalin Edition is not meant to be a “performance driver update”. In fact, Terry Makedon was amused to read claims that AMD promised big performance update after the Adrenalin Edition name was revealed. That was probably because they mistakenly thought the name was based on the hormone adrenaline…

He clarified that performance optimisation is an on-going concern, with a focus on getting specific optimisations out in time for new game launches. There will be general performance optimisations that will be delivered over the year. But AMD won’t be holding back optimisations just to deliver a major driver update with large performance boost.

With that in mind, this chart does not show a sudden performance boost with Adrenalin Edition. Instead, it shows the cumulative performance gains since the last major release – Crimson ReLive Edition.

They also managed to reduce latency across the board in all DirectX 11 titles.

 

Borderless Windowed Multi-GPU Support

The Radeon Software Adrenalin Edition introduces a new Borderless Windows Multi-GPU Support, to complement the existing Fullscreen Multi-GPU Support.

 

Frame Rate Target Control Now Supports Vulkan

Frame Rate Target Control reduces GPU power draw by throttling it to maintain a 60 fps limit. It now supports Vulkan.

[adrotate group=”1″]

Compute Profiles

Compute Profiles was released in an optional update a few weeks ago, and is now part of Adrenalin Edition. The Compute Profile optimises workloads on the GPU to deliver better compute performance for cryptocurrency mining.

In this example, they quoted a 15% boost in Ethereum mining performance with the Compute Profile over the default Gaming Profile on a Radeon RX 570 graphics card.

 

Radeon Software For Linux

AMD will start offering a single suite containing both open- and closed-source software stacks for Radeon Software. You will be able to choose between the consumer (AMDGPU) or workstation (AMDGPU-PRO) drivers, with the flexibility to mix-and-match open- and closed-source components.

AMD is working to deliver an open-source AMD Vulkan driver for Linux.

Next Page > Improved Core Radeon Technologies

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Improved Core Radeon Technologies

Radeon WattMan

The Radeon WattMan is the power management tool that doubles as an overclocking / underclocking tool. In Adrenalin Edition, custom GPU profiles can be saved, reloaded at a later point and shared with the Radeon user community

Radeon Chill

Radeon Chill saves power by dynamically regulating the frame rate based on your in-game movements. With Adrenalin Edition, Radeon Chill now supports games based on the Vulkan API, along with DirectX 9, 10, 11, and 12.

In addition, Radeon Chill now supports a lot more games. Radeon Chill used to work on a whitelist concept – it will only support games that have been profiled and tested. Thanks to improved algorithms and other changes, AMD is switching it to a blacklist concept.

With Adrenalin Edition, Radeon Chill will now work with all games. But if AMD discovers that Chill does not work properly with a certain game, it goes into the blacklist so Radeon Chill won’t run on it. Currently, there are no games in the blacklist.

[adrotate group=”1″]

Enhanced Sync

Think of Enhanced Sync as pseudo-FreeSync, minimising screen tearing with non-FreeSync monitors. With Adrenalin Edition, Enhanced Sync is now enabled on all Radeon GCN-based graphics cards, and supports all Vulkan API-based games. They also added support for Multi-GPU and AMD Eyefinity Technology.

Radeon ReLive

Radeon ReLive now has a Connect section, which serves as a control center for your Radeon ReLive video library. In addition to browsing your recorded videos, you can queue and share them on social media.

Radeon ReLive will now allow you to integrate chats from Twitch, Facebook, Mixer, YouTube, Weibo and more, to your game play.

AMD has also reduced the performance impact of Radeon ReLive. Note that these examples are from an AMD Radeon RX Vega 56 graphics card.

With Adrenalin Edition, Radeon ReLive will also supports games based on the Vulkan API.

Radeon ReLive will also come with support for :

  • Borderless Region Capture – allowing you to capture only what you want to share, instead of the entire screen.
  • Chroma Key – allowing you to remove your background in your webcam or video stream
  • AMD Eyefinity Technology – allowing you to capture your game play across multiple monitors
  • separate audio tracks – recording mic audio separately from the game audio, for easier mixing and editing later

Radeon FreeSync & Themes

With Adrenalin Edition, you can now enable or disable Radeon FreeSync on a per-game basis. And Radeon Settings will have three UI theme options – Yellow, Crimson and Blue.

Next Page > Radeon Overlay & AMD Link

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Radeon Overlay

Radeon Overlay allows you to access Radeon ReLive, Performance Monitoring, Radeon Chill, Frame Rate Target Control (FRTC), Radeon FreeSync and Color settings from within the game. Just press Alt+R to activate Radeon Overlay. This key combination, incidentally, can be changed.

Performance Monitoring and Recording

Radeon ReLive

Radeon Chill

Radeon FreeSync

Frame Rate Target Control

Color Settings

[adrotate group=”1″]

 

AMD Link

Available for Android and iOS platforms, the AMD Link is a mobile app that complements Radeon Software on the desktop, at home as a convenient second screen, or on the go.

You can link multiple PCs to AMD Link using a simple QR code, or you can do it manually. However, your mobile devices must (at least in this version) be on the same network as your computer.

The AMD Link dashboard features streaming and replay with Radeon ReLive, GPU and PC performance monitoring, an AMD news feed, and notifications for new driver releases.

AMD Link is now available on both the Apple App Store and Google Play. It supports smartphones and tablets running on iOS 10 (or better), and Android 5.0 (or better).

Next Page > Adrenalin Edition Summary & Complete Set of Slides

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Adrenalin Edition Summary

In summary, the Radeon Software Adrenalin Edition is a checkpoint when it comes to performance. Performance improvements is a continuous process, with Adrenalin Edition delivering up to 15% better performance compared to Crimson ReLive Edition a year ago.

More important are the 30+ new or enhanced features being introduced in Adrenalin Edition.

The summary includes three infographics created by Sasa Marinkovic and his team.

[adrotate group=”1″]

 

The Complete Set Of Adrenalin Edition Slides

Here is the complete set of Radeon Software Adrenalin Edition slides, minus the legal boilerplate.

[adrotate group=”1″]

Go Back To > First PageArticles | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

NVIDIA TITAN V – The First Desktop Volta Graphics Card!

NVIDIA CEO Jensen Huang (recently anointed as Fortune 2017 Businessperson of the Year) made as surprise reveal at the NIPS conference – the NVIDIA TITAN V. This is the first desktop graphics card to be built on the latest NVIDIA Volta microarchitecture, and the first to use HBM2 memory.

In this article, we will share with you everything we know about the NVIDIA TITAN V, and how it compares against its TITANic predecessors. We will also share with you what we think could be a future NVIDIA TITAN Vp graphics card!

Updated @ 2017-12-10 : Added a section on gaming with the NVIDIA TITAN V [1].

Originally posted @ 2017-12-09

 

NVIDIA Volta

NVIDIA Volta isn’t exactly new. Back in GTC 2017, NVIDIA revealed NVIDIA Volta, the NVIDIA GV100 GPU and the first NVIDIA Volta-powered product – the NVIDIA Tesla V100. Jensen even highlighted the Tesla V100 in his Computex 2017 keynote, more than 6 months ago!

Yet there has been no desktop GPU built around NVIDIA Volta. NVIDIA continued to churn out new graphics cards built around the Pascal architecture – GeForce GTX 1080 Ti and GeForce GTX 1070 Ti. That changed with the NVIDIA TITAN V.

 

NVIDIA GV100

The NVIDIA GV100 is the first NVIDIA Volta-based GPU, and the largest they have ever built. Even using the latest 12 nm FFN (FinFET NVIDIA) process, it is still a massive chip at 815 mm²! Compare that to the GP100 (610 mm² @ 16 nm FinFET) and GK110 (552 mm² @ 28 nm).

That’s because the GV100 is built using a whooping 21.1 billion transistors. In addition to 5376 CUDA cores and 336 Texture Units, it boasts 672 Tensor cores and 6 MB of L2 cache. All those transistors require a whole lot more power – to the tune of 300 W.

[adrotate group=”1″]

 

The NVIDIA TITAN V

That’s V for Volta… not the Roman numeral V or V for Vendetta. Powered by the NVIDIA GV100 GPU, the TITAN V has 5120 CUDA cores, 320 Texture Units, 640 Tensor cores, and a 4.5 MB L2 cache. It is paired with 12 GB of HBM2 memory (3 x 4GB stacks) running at 850 MHz.

The blowout picture of the NVIDIA TITAN V reveals even more details :

  • It has 3 DisplayPorts and one HDMI port.
  • It has 6-pin + 8-pin PCIe power inputs.
  • It has 16 power phases, and what appears to be the Founders Edition copper heatsink and vapour chamber cooler, with a gold-coloured shroud.
  • There is no SLI connector, only what appears to be an NVLink connector.

Here are more pictures of the NVIDIA TITAN V, courtesy of NVIDIA.

 

Can You Game On The NVIDIA TITAN V? New!

Right after Jensen announced the TITAN V, the inevitable question was raised on the Internet – can it run Crysis / PUBG?

The NVIDIA TITAN V is the most powerful GPU for the desktop PC, but that does not mean you can actually use it to play games. NVIDIA notably did not mention anything about gaming, only that the TITAN V is “ideal for developers who want to use their PCs to do work in AI, deep learning and high performance computing.

[adrotate group=”2″]

In fact, the TITAN V is not listed in their GeForce Gaming section. The most powerful graphics card in the GeForce Gaming section remains the TITAN Xp.

Then again, the TITAN V uses the same NVIDIA Game Ready Driver as GeForce gaming cards, starting with version 388.59. Even so, it is possible that some or many games may not run well or properly on the TITAN V.

Of course, all this is speculative in nature. All that remains to crack this mystery is for someone to buy the TITAN V and use it to play some games!

Next Page > Specification Comparison, NVIDIA TITAN Vp?, The Official Press Release

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

The NVIDIA TITAN V Specification Comparison

Let’s take a look at the known specifications of the NVIDIA TITAN V, compared to the TITAN Xp (launched earlier this year), and the TITAN X (launched late last year). We also inserted the specifications of a hypothetical NVIDIA TITAN Vp, based on a full GV100.

SpecificationsFuture TITAN Vp?NVIDIA TITAN VNVIDIA TITAN XpNVIDIA TITAN X
MicroarchitectureNVIDIA VoltaNVIDIA VoltaNVIDIA PascalNVIDIA Pascal
GPUGV100GV100GP102-400GP102-400
Process Technology12 nm FinFET+12 nm FinFET+16 nm FinFET16 nm FinFET
Die Size815 mm²815 mm²471 mm²471 mm²
Tensor Cores672640NoneNone
CUDA Cores5376512038403584
Texture Units336320240224
ROPsNANA9696
L2 Cache Size6 MB4.5 MB3 MB4 MB
GPU Core ClockNA1200 MHz1405 MHz1417 MHz
GPU Boost ClockNA1455 MHz1582 MHz1531 MHz
Texture FillrateNA384.0 GT/s
to
465.6 GT/s
355.2 GT/s
to
379.7 GT/s
317.4 GT/s
to
342.9 GT/s
Pixel FillrateNANA142.1 GP/s
to
151.9 GP/s
136.0 GP/s
to
147.0 GP/s
Memory TypeHBM2HBM2GDDR5XGDDR5X
Memory SizeNA12 GB12 GB12 GB
Memory Bus3072-bit3072-bit384-bit384-bit
Memory ClockNA850 MHz1426 MHz1250 MHz
Memory BandwidthNA652.8 GB/s547.7 GB/s480.0 GB/s
TDP300 watts250 watts250 watts250 watts
Multi GPU CapabilityNVLinkNVLinkSLISLI
Launch PriceNAUS$ 2999US$ 1200US$ 1200

 

The NVIDIA TITAN Vp?

In case you are wondering, the TITAN Vp does not exist. It is merely a hypothetical future model that we think NVIDIA may introduce mid-cycle, like the NVIDIA TITAN Xp.

Our TITAN Vp is based on the full capabilities of the NVIDIA GV100 GPU. That means it will have 5376 CUDA cores with 336 Texture Units, 672 Tensor cores and 6 MB of L2 cache. It will also have a higher TDP of 300 watts.

[adrotate group=”1″]

 

The Official NVIDIA TITAN V Press Release

December 9, 2017—NVIDIA today introduced TITAN V, the world’s most powerful GPU for the PC, driven by the world’s most advanced GPU architecture, NVIDIA Volta .

Announced by NVIDIA founder and CEO Jensen Huang at the annual NIPS conference, TITAN V excels at computational processing for scientific simulation. Its 21.1 billion transistors deliver 110 teraflops of raw horsepower, 9x that of its predecessor, and extreme energy efficiency.

“Our vision for Volta was to push the outer limits of high performance computing and AI. We broke new ground with its new processor architecture, instructions, numerical formats, memory architecture and processor links,” said Huang. “With TITAN V, we are putting Volta into the hands of researchers and scientists all over the world. I can’t wait to see their breakthrough discoveries.”

NVIDIA Supercomputing GPU Architecture, Now for the PC

TITAN V’s Volta architecture features a major redesign of the streaming multiprocessor that is at the center of the GPU. It doubles the energy efficiency of the previous generation Pascal design, enabling dramatic boosts in performance in the same power envelope.

New Tensor Cores designed specifically for deep learning deliver up to 9x higher peak teraflops. With independent parallel integer and floating-point data paths, Volta is also much more efficient on workloads with a mix of computation and addressing calculations. Its new combined L1 data cache and shared memory unit significantly improve performance while also simplifying programming.

Fabricated on a new TSMC 12-nanometer FFN high-performance manufacturing process customised for NVIDIA, TITAN V also incorporates Volta’s highly tuned 12GB HBM2 memory subsystem for advanced memory bandwidth utilisation.

 

Free AI Software on NVIDIA GPU Cloud

[adrotate group=”2″]

TITAN V’s incredible power is ideal for developers who want to use their PCs to do work in AI, deep learning and high performance computing.

Users of TITAN V can gain immediate access to the latest GPU-optimised AI, deep learning and HPC software by signing up at no charge for an NVIDIA GPU Cloud account. This container registry includes NVIDIA-optimised deep learning frameworks, third-party managed HPC applications, NVIDIA HPC visualisation tools and the NVIDIA TensorRT inferencing optimiser.

More Details : Now Everyone Can Use NVIDIA GPU Cloud!

 

Immediate Availability

TITAN V is available to purchase today for US$2,999 from the NVIDIA store in participating countries.

Go Back To > First PageArticles | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

The Symantec 2018 Cybersecurity Predictions

David Rajoo, Director of Systems Engineering, Symantec Malaysia, reveals the Symantec 2018 Cybersecurity Predictions. They will help CIOs and cybersecurity experts prepare for the onslaught of cybersecurity threats in 2018.

 

The Symantec 2018 Cybersecurity Predictions

This past year, cyber criminals caused major service disruptions around the world, using their increasing technical proficiency to break through cyber defenses. In 2018, we expect the trend to become more pronounced as these attackers will use machine learning and artificial intelligence to launch even more potent attacks.

Gear up for a busy year ahead. Incidents like the WannaCry attack, which impacted more than 200,000 computers worldwide in May, are just the warmup to a new year of more virulent malware and DDoS attacks. Meanwhile, cyber criminals are poised to step up their attacks on the millions of devices now connected to the Internet of Things both in offices and homes.

The cybersecurity landscape in 2018 is sure to surprise us in ways that we never imagined. As 2017 draws to a close, here is what you can expect over the course of the upcoming year:

 

The Symantec 2018 Cybersecurity Predictions Part 1/3

Blockchain Will Find Uses Outside Of Cryptocurrencies But Cyber criminals Will Focus On Coins and Exchanges

Blockchain is finally finding applications outside of crypto-currencies, expanding its functions in inter-bank settlements with the help of IoT gaining traction. However, these use cases are still in their infancy stage and are not the focus for most cyber criminals today.

Instead of attacking Blockchain technology itself, cyber criminals will focus on compromising coin-exchanges and users’ coin-wallets since these are the easiest targets, and provide high returns. Victims will also be tricked into installing coin-miners on their computers and mobile devices, handing their CPU and electricity over to cyber criminals.

 

Cyber criminals Will Use Artificial Intelligence (AI) & Machine Learning (ML) To Conduct Attacks

No cyber security conversation today is complete without a discussion about AI and ML. So far, these conversations have been focused on using these technologies as protection and detection mechanisms. However, this will change in the next year with AI and ML being used by cyber criminals to conduct attacks.

It is the first year where we will see AI versus AI in a cybersecurity context. Cyber criminals will use AI to attack and explore victims’ networks, which is typically the most labour-intensive part of compromise after an incursion.

Next Page > The Symantec 2018 Cybersecurity Predictions Part 2/3

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

The Symantec 2018 Cybersecurity Predictions Part 2/3

Supply Chain Attacks Will Become Mainstream

Supply chain attacks have been a mainstay of the classical espionage and signals-intelligence operators, compromising upstream contractors/systems/companies and suppliers. They are proven to have a high-level of effectiveness, with nation-state actors using a mix of human intelligence to compromise the weakest link in the chain.

These attacks are moving into the cybercriminal space, becoming mainstream. With publicly available information on suppliers, contractors, partnerships and key-people, cyber criminals can find victims in the supply chain and attack the weakest link. With a number of high profile successful attacks in 2016 and 2017, cyber criminals will focus on this method in 2018.

 

File-less and File-light Malware Will Explode

2016 and 2017 have seen consistent growth in the amount of file-less and file-light malware, with attackers capitalising organizations that lack in preparation against such threats. With fewer Indicators of Compromise (IoC), use of the victims’ own tools, and complex disjointed behaviours, these threats have been harder to stop, track and defend against in many scenarios.

Like the early days of ransomware, where early success by a few cyber criminals triggered a gold-rush like mentality, more cyber criminals are now rushing to use these same techniques. Although file-less and file-light malware will still be outnumbered by orders-of-magnitude as traditional style malware, they will pose a significant threat and lead to an explosion in 2018.

[adrotate group=”1″]

 

Organisations Will Still Struggle With Security-as-a-Service (SaaS) Security

Adoption of SaaS continues to grow at an exponential rate as organizations embark on digital transformation projects to drive business agility. This rate of change and adoption presents many security challenges as access control, data control, user behaviour and data encryption vary significantly between SaaS apps. While this is not new and many of the security problems are well understood, organizations will continue to struggle with all these in 2018.

Combined with new privacy and data protections laws adopted by regulators across the world, these will pose major implications in terms of penalties, and more importantly, reputational damage.

 

Organisations Will Still Struggle With Infrastructure-as-a-Service (IaaS) Security – More Breaches Due to Error, Compromise & Design

IaaS has completely changed the way organisations run their operations, offering massive benefits in agility, scalability, innovation and security. It also introduces significant risks, with simple errors that can expose massive amount of data and take down the entire system.

While security controls above the IaaS layer are customer’s responsibility, traditional controls do not map well – leading to confusion, errors and design issues with ineffective or inappropriate controls being applied, while new controls are ignored. This will lead to more breaches throughout 2018 as organizations struggle to shift their security programs to be IaaS effective.

Next Page > The Symantec 2018 Cybersecurity Predictions Part 3/3

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

The Symantec 2018 Cybersecurity Predictions Part 3/3

Financial Trojans Will Still Account For More Losses Than Ransomware

Financial Trojans were some of the first pieces of malware to be monetised by cyber criminals. From simple beginnings as credential harvesting tools, they have since evolved to advanced attack frameworks that target multiple banks, and banking systems that send shadow transactions and hide their tracks. They have proven to be highly profitable for cyber criminals.

Today the move to mobile application-based banking has curtailed some of the effectiveness, so cyber criminals are now moving their attacks to these platforms. Cyber criminals’ profits from Financial Trojans is expected to grow, giving them higher gains as compared to Ransomware attacks.

 

Expensive Home Devices Will Be Held To Ransom

Ransomware has become a major problem and is one of the scourges of the modern Internet, allowing cyber criminals to reap huge profits by locking up users’ files and systems. The gold-rush mentality has not only pushed more and more cyber criminals to distribute ransomware, but also contributed to the rise of Ransomware-As-A-Service and other specializations in the cyber criminal underworld.

These specialists are now looking to expand their attack reach by exploiting the massive increase in expensive connected home devices. Smart TVs, smart toys and other smart appliances can run into thousands of dollars and users are generally not aware of the threats to these devices, making them an attractive target for cyber criminals.

[adrotate group=”1″]

 

IoT Devices Will Be Hijacked and Used in DDoS Attacks

In 2017, we have seen massive DDoS attacks using hundreds of thousands of compromised IoT devices in people’s homes and workplaces to generate traffic. This is not expected to change with cyber criminals looking to exploit the poor security settings and management of home IoT devices.

Furthermore, the inputs and sensors of these devices will also be hijacked, with attackers feeding audio, visual or other faked inputs to make these devices do what they want rather than what users expect them to do.

 

IoT Devices Will Provide Persistent Access to Home Networks

Beyond DDoS attacks and ransomware, home IoT devices will be compromised by cyber criminals to provide persistent access to a victim’s network. Home users generally do not consider the cyber security implications of their home IoT devices, leaving default settings and not vigilantly updating them like they do with their computers.

Persistent access means that no matter how many times a victim cleans their machine or protects their computer, the attacker will always have a backdoor into victims’ network and the systems that they connect to.

Go Back To > First PageArticles | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

AMD Quietly Introduces Radeon RX 560 With 14 CUs!

The AMD Radeon Technologies Group have gotten ensnared in a little bit of controversy recently. They quietly introduced a “lite” version of the Radeon RX 560 with just 14 Compute Units about six months ago. That quiet addition of a cut-down version with no clear differentiation in name did not go unnoticed, and AMD was forced to quickly address the issue.

 

The AMD Radeon RX 560 With 14 Compute Units

When AMD introduced the Radeon RX 560, it was not just a rebranded Radeon RX 460. The RX 560 touted two additional Compute Units over the Rx 460. That gives the RX 560 a total of 1,024 stream processors128 more than the RX 460, with just 896 stream processors.

However, AMD later quietly introduced a “lite” version of the Radeon RX 560, with just 14 Compute Units. This would essentially be a rebranded Radeon RX 460, with 896 stream processors.

The only change AMD made was in the specifications section of the Radeon RX 560 product page. Even the banner still quotes the original 16 CU specification!

So it would be easy for anyone to continue believing that all Radeon RX 560 graphics cards were created equal – with 1,024 stream processors.

 

AMD On The Radeon RX 560 With 14 Compute Units

Tom’s Hardware pressed AMD on this issue, and received this statement from a company representative :

There are two variants of AMD Radeon RX 560. End users will definitely need to double check specs on variants.

Typically the RX560 14 CU version will sell lower than 16 CU version, [and the] 14 CU version will have lower power consumption.

This allows our GPU partners to offer differentiation between different SKUs for different power and pricing segments.

AMD also clarified that they will be leaving it to their AIB partners to disclose the number of CUs in their Radeon RX 560 product (or not), it is truly caveat emptor to anyone buying one of these cards. That naturally resulted in an online uproar.

[adrotate group=”1″]

A day later, AMD backtracked on leaving it to their AIB partners for disclosure. They issued a new statement :

It’s correct that 14 Compute Unit (896 stream processors) and 16 Compute Unit (1024 stream processor) versions of the Radeon RX 560 are available. We introduced the 14 CU version this summer to provide AIBs and the market with more RX 500 series options.

It’s come to our attention that on certain AIB and e-tail websites there’s no clear delineation between the two variants.

We’re taking immediate steps to remedy this: we’re working with all AIB and channel partners to make sure the product descriptions and names clarify the CU count, so that gamers and consumers know exactly what they’re buying.

We apologize for the confusion this may have caused.

While that is a relief for potential buyers of the Radeon RX 560 going forward, those who purchased their RX 560 cards in the last 6 months will be wondering if they have the “full” or “lite” version of the Radeon RX 560.

 

How Many CUs Does My Radeon RX 560 Have?

If you purchased a Radeon RX 560 in the last 6 months, it may come with 14 CUs instead of 16 CUs. How do you check?

Simple – download and run GPU-Z. It will tell you how many Compute Units your Radeon RX 560 has.

Go Back To > Articles | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Apple Rushed Out macOS Root Bug Fix & It Shows…

Lemi Orhan Ergin did not give Apple any forewarning when he publicly revealed the massive macOS root bug on Twitter. He basically exposed a zero-day vulnerability for hackers to use, while Apple rushed on a bug fix. The good news is Apple just issued the root bug fix in Security Update 2017-001.

This is really fast work, but it also showed their sloppiness. Hopefully, the bug fix does not introduce additional bugs!

 

macOS Security Update 2017-001

[adrotate group=”2″]

Apple released macOS Security Update 2017-001 just a day after the macOS root bug was revealed. They also gave us more information on the bug that caused so much ruckus around the world (and rightly so).

  • The bug only affected macOS High Sierra 10.13.1.
  • The bug did not affect computers running macOS Sierra 10.12.6 or earlier.
  • They confirmed that it allowed an attacker to “bypass administrator authentication without supplying the administrator’s password“.

You can get more details on the root bug in our dedicated article – The macOS High Sierra Root Bug Explained!

 

How Do I Download The Root Bug Fix?

The macOS root bug fix is now available for download via the App Store. If it doesn’t appear yet, just click on the Updates icon to refresh.

Please note that this bug fix will reset and disable the root user account.  If you need to use the root user account, you will need to re-enable it, and change its password, after applying the update.

 

Terminal Users, Watch Out!

If you’re using Terminal to update though, you may face some complications due to Apple’s sloppiness. Chai discovered that Apple accidentally used a space instead of the version number.

This is not an issue if you are downloading the patch through the App Store. But if you’re applying the patch via Terminal, you need to add a space.

softwareupdate -i “Security Update 2017-001- “

Go Back To > Articles | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

The macOS High Sierra Root Bug Explained! Rev. 2.0

The Internet is abuzz with the shocking revelation that now everyone can hack an Apple computer… as long as it’s using the latest macOS High Sierra operating system. Let us explain what’s going on, and share with you the workaround for the macOS High Sierra root bug.

Updated @ 2017-11-30 : Added a new section on the Apple bug fix (Security Update 2017-001) [1], and additional information on the root bug [2].

Originally posted @ 2017-11-29

 

What Is Root User?

If you are the primary user of a MacOS X system, you have an administrator account with administrator privileges. This gives you more privileges and access than a standard user account. However, that is not the highest access level possible.

There is a Mac superuser account called “root” that gives you elevated read and write privileges to hidden or protected areas of the system. With the Mac root user account, you can even access files in other user accounts.

In fact, it gives you such God-like powers, you can modify or even delete critical system files. In fact, a Mac root user can use the rm -rf * command to delete the contents of every mounted drive in the computer, until macOS crashes when a crucial file or folder is deleted.

So this Mac root user account should only remain disabled unless you really, REALLY need to use it.

Suggested Reading : The Mac Root User Login & Password Guide

 

The macOS High Sierra Root Bug Updated!

On Tuesday, 28 November 2017, Turkish software developer Lemi Orhan Ergin revealed the macOS High Sierra root bug. With a few simple steps, anyone can gain elevated root user privileges in any computer running macOS High Sierra! Here is a summary of what we know about the root bug :

  1. The root bug exploit requires a computer running macOS High Sierra, with multiple user accounts.
  2. When prompted for a username and password, use these steps to gain root user access without any password :
    • Type “root” as the username and leave the password field blank.
    • Just click “Unlock” twice.
  3. The root bug cannot be exploited remotely, unless screen sharing is enabled.
  4. The root bug was introduced in macOS High Sierra 10.13.1. Earlier versions of macOS were not affected.
  5. Apple confirmed that the bug was due to “a logic error… in the validation of credentials“.
  6. Apple also confirmed that the bug would allow an attacker to “bypass administrator authentication without supplying the administrator’s password“.
  7. Several security researchers successfully replicated the bug.

 

How Serious Is This Root Bug?

The macOS High Sierra root bug is EXTREMELY serious, because it allows a hacker to easily bypass all of the macOS operating system’s security protections.

It doesn’t matter if you encrypted your computer, and secured it with an extremely long and complex password. Anyone who gains root user privileges using this bug can access (read, copy or move) the files in any user account (even those of an administrator) without knowing the password.

What’s even more troubling is that the root bug works even with a disabled root user account. This means the vast majority of Apple computers running on High Sierra are compromised, as the root user account is disabled by default.

 

How To Fix The Root Bug?

Unlike other security researchers, Lemi Orhan Ergin did not forewarn Apple before publicly revealing the bug, on Twitter no less. He basically exposed a zero-day vulnerability for hackers to use, while Apple rushes to fix the bug.

1. Install macOS Security Update 2017-001 New!

Apple just released Security Update 2017-001. This update will remove the root bug and improve credential validation. INSTALL THIS UPDATE NOW!

Note : This bug fix will reset and disable the root user account.  If you need to use the root user account, you will need to re-enable it, and change its password, after applying the update.

Note : Apple rushed out this update so quickly that they accidentally used a space instead of the version number. You can read more about this in our article – Apple Rushed Out macOS Root Bug Fix & It Shows…

This is not an issue if you are downloading the patch through the App Store. But if you’re applying the patch via Terminal, you need to add a space.

softwareupdate -i “Security Update 2017-001- “

2. Enable Root User With Your Own Password

[adrotate group=”2″]

If you cannot apply Apple’s bug fix yet, you can block this root bug by enabling the root user account, and setting a password for it.

It’s not so straightforward, so we created a step-by-step guide for you – The Mac Root User Login & Password Guide.

3. Use Additional Encryption

Alternatively, you can opt to move your sensitive data to encrypted containers or drives using third-party encryption utilities like VeraCrypt. Hackers may use the High Sierra root bug to gain access to the encrypted containers or drives, but without the correct password, the actual data won’t be accessible.

4. Physically Protect Your Apple Computer

The good news is the High Sierra root bug generally requires physical access to your Apple computer. Until this bug is fixed, you should make sure your Apple computer is never left unsupervised.

Keep it in a locked room or bag, whenever you are not using it. If no one can get to it, they cannot use the bug to gain root access.

5. Disable Screen Sharing

The High Sierra root bug can be exploited remotely if Screen Sharing is enabled. So make sure you disable Screen Sharing.

Go Back To > Articles | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

The Machines Protection Plan Explained!

Machines Sdn Bhd (Machines) just launched a device protection plan for customers in Malaysia. Known as the Machines Protection Plan (MPP), this plan provides protection from accidental damage such as cracked screens and water damage for as low as 42 sen per day.

 

The Machines Protection Plan

The Machines Protection Plan (MPP) allows customers to enjoy one (1) screen replacement or one (1) full device replacement during the two (2) year coverage period. The MPP price ranges from RM 299 – RM 899 (~US$ 73-219), depending on the model of the protected device, and can be obtained at local Machines stores upon purchase of a new device.

The Machines Protection Plan (MPP) provides coverage for parts and labour cost. For a full device replacement claim, a service fee will be charged on top of the price for the MPP. For example, for an iPhone SE full device replacement, customers will need to pay a service fee of RM299 on top of the iPhone SE MPP cost of RM299.

[adrotate group=”2″]

A survey by Otterbox Inc. in 2015 stated that 29% of Malaysians accidentally damage their smartphones within the first three months of purchase. The same study also revealed that 75% of Malaysian smartphone users have damaged their devices almost 3 times in the past 5 years.

Machines has selected Aon Insurance Brokers (Malaysia) Sdn Bhd (Aon Malaysia) as its insurance broker to offer this device protection plan, underwritten by AIG Malaysia Insurance Berhad.

Machines is also working to extend the Machines Protection Plan to include new devices purchased from third parties, including telcos.

 

The Machines Protection Plan Price List

Device MPP Price (inc. of GST)
Apple Watch RM 299 / ~US$ 73
iPhone SE / 6 RM 299 / ~US$ 73
iPhone 6s / 6s Plus RM 599 / ~US$ 146
iPhone 7 / 7 Plus RM 599 / ~US$ 146
iPhone 8 / 8 Plus RM 599 / ~US$ 146
iPhone X RM 899 / ~US$ 219

 

Service Fee Table For Full Device Replacement

This “service fee” is an additional fee that must be paid for a full device replacement, as opposed to a repair or part replacement.

Device Full Device Replacement Service Fee
(inc. GST)
Apple Watch RM 249 / ~US$ 61
iPhone SE / 6 RM 299 / ~US$ 73
iPhone 6s / 6s Plus RM 299 / ~US$ 73
iPhone 7 / 7 Plus RM 299 / ~US$ 73
iPhone 8 / 8 Plus RM 299 / ~US$ 73
iPhone X RM 499 / ~US$ 122
[adrotate group=”1″]

 

How Much Will You Save?

If you have butter fingers and keep dropping your expensive iPhone, you will stand to save a lot of money.

Device Regular Price for Screen Replacement
(inc. of GST)
Price for Screen Replacement under MPP
(inc. of GST)
iPhone SE / 6 RM 699 / ~US$ 170 No Charge
iPhone 6s / 7 / 8 RM 799 / ~US$ 195 No Charge
iPhone 6s Plus / 7 Plus / 8 Plus RM 899 / ~US$ 219 No Charge
iPhone X RM 1799 / ~US$ 439 No Charge

If you plan to hang onto your iPhone for many, many years, you will also save on the battery replacement cost.

Device Regular Price for Battery Replacement
(inc. of GST)
Price for Battery Replacement under MPP
(inc. of GST)
iPhone SE RM 399 / ~US$ 97 RM 49 / ~US$ 12
iPhone 6 RM 499 / ~US$ 122 RM 49 / ~US$ 12
iPhone 6s / 6s Plus RM 399 / ~US$ 97 RM 49 / ~US$ 12
iPhone 7 / 7 Plus RM 399 / ~US$ 97 RM 49 / ~US$ 12
iPhone 8 / 8 Plus RM 399 / ~US$ 97 RM 49 / ~US$ 12
iPhone X TBC RM 49 / ~US$ 12

Please note that they will only replace your battery when it cannot be charged beyond 50% of its original capacity. In addition, you’re only allowed one battery repair or replacement, and that’s subject to the service fee above.

Go Back To > Articles | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!