Intel / Micron Announce 3D NAND Production with Industry's Highest Density: More than 10TB on a 2.5" SSD
Intel and Micron are jointly announcing new 3D NAND technology that will radically increase solid-storage capacity going forward. The companies have indicated that moving to this technology will allow for the type of rapid increases in capacity that are consistent with Moore’s Law.
The way Intel and Micron are approaching 3D NAND is very different from existing 3D technologies from Samsung and now Toshiba. The implementation of floating-gate technology and “unique design choices” has produced startling densities of 256 Gb MLC, and a whopping 384 Gb with TLC. The choice to base this new 3D NAND on floating-gate technology allows development with a well-known entity, and benefits from the knowledge base that Intel and Micron have working with this technology on planar NAND over their long partnership.
What does this mean for consumers? This new 3D NAND enables greater than 10TB capacity on a standard 2.5” SSD, and 3.5TB on M.2 form-factor drives. These capacities are possible with the industry’s highest density 3D NAND, as the >3.5TB M.2 capacity can be achieved with just 5 packages of 16 stacked dies with 384 Gb TLC.
Read more here: http://www.pcper.com/news/Storage/Intel-Micron-Announce-3D-NAND-Production-Industrys-Highest-Density-10TB-25-SSD
Surge Protectors Aren't Forever.
Surge protectors aren't magic. When they receive a power surge from the electrical outlet they’re plugged into, they have to do something with that extra voltage to get rid of it and shield the connected devices from it.
A typical surge protector uses a component called a metal oxide varistor (MOV). When the voltage spikes, the surge protector effectively diverts that extra voltage to the MOV component. This component degrades when it’s exposed to either a small number of large surges or a larger number of smaller surges. The additional energy doesn’t damage your devices — it stays in the surge protector, where it degrades the MOV.
In other words, your surge protector can only absorb so many surges before it stops functioning as a surge protector and starts functioning as a dumb power strip that’ll let everything through to your devices.
Read More Here: http://www.howtogeek.com/212375/why-and-when-you-need-to-replace-your-surge-protector/
NOTE: At RJM Computers we stock a large line of surge protectors and uninterruptible (battery backup) power supplies. Stop in today! http://rjmelectronics.com/power.html
Hacking even the most secure data is easier than previously thought. This was evidenced by two researchers at the CanSecWest security conference in Vancouver last week.
The two computer security experts, Xeno Kovah and Corey Kallenberg, exhibited a proof-of-concept, showing how to hack into BIOS chips, which are microchips containing the firmware of a computer’s motherboard.
"The BIOS boots a computer and helps load the operating system," Wired explained. "By infecting this core software, which operates below antivirus and other security products and therefore is not usually scanned by them, spies can plant malware that remains live and undetected even if the computer’s operating system were wiped and re-installed. "
Read more: http://www.businessinsider.com/hackers-found-a-way-to-get-into-nearly-every-computer-2015-3#ixzz3VK2U2CFU
Today at the renewed Windows Hardware Engineering Community (WinHEC) summit in Shenzhen, China, I had the honor of speaking about Windows 10 and the innovation and opportunity it offers our valued partners. China is a global epicenter for innovation and we’re excited to be working with the area’s leading hardware and software companies to develop ground-breaking devices and consumer experiences that will help shape the future of Windows 10.
We continue to make great development progress and shared today that Windows 10 will be available this summer in 190 countries and 111 languages. Windows has always been global with more than 1.5 billion users around the world and here in China hundreds of millions of PCs operate Windows today. That’s why it was particularly fun to show our latest global innovation, Windows Hello, on stage for the first time, and to feature a number of Windows 10 customizations for the China market, such as Cortana in Mandarin.
Upgrading Millions of Customers with Lenovo, Tencent and Qihu 360On January 21, I shared our commitment to offer a free upgrade to Windows 10 for hundreds of millions of customers running Windows 7, Windows 8.1 and Windows Phone 8.1 for the first year after it is released.
A key way we will make the upgrade experience to Windows 10 easy is through strong partnerships with technology leaders. Today, we shared new partnerships with several world-leading companies to deliver a seamless Windows 10 upgrade experience to our customers in China. Strategic partnerships with Lenovo, Tencent and Qihu 360 will help Windows 10 reach hundreds of millions of customers in China and spur adoption of Windows 10 worldwide.
Read more here: https://blogs.windows.com/bloggingwindows/2015/03/17/windows-10-launching-this-summer-in-190-countries-and-111-languages/
Researchers have spotted malware that targets gamers, and threatens to trash their in-game progress unless they pay up
Once installed, Teslacrypt scans the machine's file system, and encrypts files that match a list of types, generating a random AES key for each file using OpenSSL code and using that key to scramble the data. It then encrypts the AES keys using the public key from a 2048-bit RSA key pair.
The private key, needed to decrypt the per-file keys and ultimately restore the scrambled data, is stored on the criminals' command-and-control server.
Victims have to pay a ransom of $500 in Bitcoin, or buy and hand over a $1,000 Paypal My Cash payment card, using a website hidden in the Tor network, to download their decryption key before it is destroyed.
The software nasty, dubbed Teslacrypt, works in the same way as traditional ransomware like Cryptolocker. It attempts to infect Windows PCs by exploiting a vulnerability in Adobe Flash (CVE-2015-0311) or Internet Explorer (CVE-2013-2551). A victim has to visit a booby-trapped website to get infected, although the malware backs off if it detects the presence of some antivirus packages, or if it's running in a virtual machine.
Read more here: http://www.theregister.co.uk/2015/03/13/ransomware_video_games/
Kaspersky Lab has revealed a long-standing operation of cyber espionage conducted by the hacker group called "Ekvejžn".
(Translated from Russian - language may be somewhat off)
The company Kaspersky Lab has revealed a long-standing operation of cyber espionage conducted by the hacker group called "Ekvejžn".
The company said that it was the most advanced group with whom they'd ever met, and that the methods used are revolutionary in the field of technology. It is suspected in connection with the hacker group American agency NSA.
In the last 15 years, the hacker group - by the research team of the company Kaspersky called "Ekvejžn" (Equation) - infecting the computers in more than 30 countries. It is believed that the group has exceptional skills and unlimited resources.
"Ekvejžn" group is probably active since the late 90s, but has reached a climax in 2008 when he developed an incredibly powerful technological weapons.
The past 20 years have used several versions of malware to infect computers governments, telecommunications companies, the military, the institutions dealing with nuclear research, energy companies. A sophisticated system of espionage was used on thousands of computers belonging to officials, scientists, businessmen and journalists.
Kaspersky followed the operation of these groups in more than 30 countries, including Iran, Russia, Syria, Afghanistan, Hong Kong, Mexico, the US, France, Switzerland, United Kingdom and India.
The company is not directly appointed by a State or an agency that stands behind this operation but stressed the connection with the system "Staksnet" leading cyber weapon of the US NSA (National Security Agency) that was used in an attack on Iran's nuclear program. In addition, the fact that the largest number of infections detected in countries that are not in good relations with the United States (Russia, Iran, Syria) clearly indicates when the suspect.
Source Reuters, who once worked at the NSA, confirmed the discovery and analysis of Kaspersky Lab, as well as the agency responsible for the operation.
"The hacker group has found a way to hide spyware deep within the hard disk. Their malware can reprogram "firmware" hard drives of all known manufacturers (IBM, Samsung, Toshiba, Western Didžital) and separates himself for special hidden sectors. When this malware infected disk it is practically impossible to delete "explains Kosti Raju research team from Kaspersky Lab.
"The ability to reprogram the" firmware "hard disk drive all the leading manufacturers is something unbelievable. I honestly do not believe that in the world there is a hacker group that has the ability to "Ekvejžn" adds Raju and concludes that one possible explanation for this is that the group worked together with producers.
NSA is more likely to get hold of unique codes necessary to activate viruses. One of them is that they are based on a contract between the Pentagon and the company required the codes for "security audit".
Peter Svajr, a member of Obama's groups for intelligence and communication technology, says that this can have consequences on the economic and diplomatic relations with the United States and other countries.
"Who is the real criminal?", Asks Kristin Hrafnson, a spokesman for WikiLeaks. We are told that the biggest cyber threat comes from China and North Korea, and in fact the real danger here in the United States. They its technology can cause havoc around the world.
She adds that probably stands behind everything NSA. "No other agency that has this capability and resources," adds Kristin.
Cryptologist and expert in IT security Bruce Schneider also believes that these techniques belong to the NSA, or possibly their partner British GCHQ.
Mobile users exposed: SSL/TLS vulnerabilities live on Our lead Key Topic discusses cryptographic vulnerabilities in popular mobile apps that allow cybercriminals to establish man-in-the-middle attacks when users sign on to their mobile apps’ companion websites. Poor programming practices by these app developers expose their users to a variety of SSL/TLS vulnerabilities such as BERserk and Heartbleed, which relate to the formation of secure sessions. As a result, all communications between the mobile apps and their websites, including usernames and passwords, are potentially viewable by cybercriminals. This exposure, coupled with the commercial availability of mobile malware source code and the McAfee Labs prediction that mobile malware generation kits will soon be offered on the dark web, is a recipe for theft and could lead to an erosion of trust in the Internet.
You can read the entire report here:
Video game fan coughs up blood and drops dead in Shanghai internet café after playing World Of Warcraft straight for 19 hours
A video game fan coughed up blood and dropped dead in a Chinese internet cafe after playing World Of Warcraft for 19 consecutive hours without a break.
Wu Tai, 24, went to the unnamed internet cafe in the Chinese capital Shanghai to play the latest installment of the role-playing fantasy game alongside other fans of the popular series.
Read more here: