Surface Book 2: More cores, more GPU, and more screen
Microsoft’s super-flexible systems get potent upgrade. Alas, still no Thunderbolt 3.
Microsoft’s super-flexible systems get potent upgrade. Alas, still no Thunderbolt 3.
It also gives you a reason to use the Photo and OneDrive apps.
One thing that Google left unannounced during its Pixel 2 launch event on October 4th is being revealed today: it’s called the Pixel Visual Core, and it is Google’s first custom system-on-a-chip (SOC) for consumer products.
MalwareHunterTeam discovered a new variant of the CryptoMix ransomware that is appending the .x1881 extension to encrypted file names. It’s has been about three weeks since a new CryptoMix variant was released, which is quite long for this family of ransomware.
A new ransomware called Anubi was discovered by Malwarebytes security researcher S!Ri that appends the .[anubi@cock.li].anubi extension to encrypted files. While not much is known about how this ransomware is distributed, as it is in the wild I thought I would provide a brief summary of the ransomware.
The programming language got a serious boost in the developer community when Google officially announced earlier this year, at the Google I/O 2017 conference, that Kotlin will become the first third-party supported programming language for Android apps, besides Java.
Infineon TPM chipsets that come with many modern-day motherboards generate insecure RSA encryption keys that put devices at risk of attack.
Mathy Vanhoef, a researcher from the University of Leuven (KU Leuven), has discovered a severe flaw in the Wi-Fi Protected Access II (WPA2) protocol that secures all modern protected Wi-Fi networks.
With new features, open betas and security updates (for the most part), OnePlus have been showing they were serious in their dedication to updates since they merged their disparate development teams.
Google, JFrog, Red Hat, IBM, Black Duck, Twistlock, Aqua Security and CoreOS today announced Grafeas (“scribe” in Greek), a new joint open-source project that provides users with a standardized way for auditing and governing their software supply chain.