Cloud technology and AI are rapidly changing the state of our technological landscape. Many old forms of technology have started to become obsolete, as...
Artificial intelligence has led to some major changes in the nature of business. Companies around the world spent over $328.34 billion on AI last year and this figure is growing at a rapid rate. It is projected to be worth nearly $1.4 trillion by 2029. Many companies have started using AI technology to streamline and […]
Here are the top trending news from the world of technology 1) Brazil bans Telegram app for spreading misinformation Brazilian supreme court has ordered immediate shutdown of Telegram app across the South American country. Justifying its bold decision, the Brazilian Supreme Court said that Telegram app failed to comply with the regulatory laws and was [...]
Formed in a fury to counter Russia’s blitzkrieg attack, Ukraine’s hundreds-strong volunteer “hacker” corps is much more than a paramilitary cyberattack force in Europe’s first major war of the internet age. It is crucial to information combat and to crowdsourcing intelligence.
Intel launched its 12th-gen mobile and desktop Core processors for businesses today—Alder Lake processors with included vPro technology. And, in the way it continues to segment its processor lineup, Intel has added two new categories of its vPro technologies: vPro Essentials for small businesses, and vPro Enterprise for Chrome devices.
Intel expects its customers to ship 150 commercial designs or more using the new vPro chips, from Acer, Asus, Dell, Fujitsu, HP, Lenovo, Samsung, and Panasonic.
Intel's new Alder Lake vPro chip follows the 11th-gen Tiger Lake mobile vPro chips Intel announced a year ago, which introduced Intel's premium brand to the vPro product lineup. In Tiger Lake, Intel added what is called Intel Control Flow Enforcement Technology (CET) and Intel Threat Detection (TDT) to Hardware Shield, which protects against attacks to the PC's firmware. In Alder Lake, Intel has added additional protections to Hardware Shield, defending against ransomware, cryptomining and supply-chain attacks. Those also include extending CET to desktop processors, Intel said.
Intel
Specifically, the new technology involves anomalous-behavior detection, according to Stephanie Hallford, vice president and general manager of Intel's Client Computing Group's business client platforms, which scans for both “good” and “bad” app behavior. The technology is designed to block “living off the land” attacks, a file-less malware attack that simply injects bad code into existing, legitimate software, which then executes attacks against the system.
The new 12th-gen Alder Lake chips also include what Intel calls Total Memory Encryption Multi-Key (TME-MK) and Intel Virtualization Technology with Redirect Protection (VT-rp), which provides hardware support for new virtualization capabilities that Microsoft plans to add in a future OS release, Intel said.
Intel didn't provide a comprehensive list of the differences between vPro Enterprise and VPro Essentials, but a white paper identified both VT-rp as well as Intel Active Management remote maintenance and control as two features that vPro Essentials doesn't support. Intel Key Locker, “used in select Chrome devices to help protect keys used by AES-NI encryption,” is also specific to the vPro Enterprise for Chrome technologies.
Intel
Intel 12th-gen vPro platforms will include ECC versions of DDR5 and LPDDR5 memory, support for Wi-Fi 6E, wired 2.5Gbps Ethernet, and Thunderbolt 4, Intel said.
Naturally, Intel touted the performance improvements that the new chips offered both on mobile as well as desktop, claiming that its mobile Core i7-1280P processor is 27 percent faster on the CrossMark benchmark than its 11th-gen Core chip and 41 percent faster than the Ryzen 7 Pro 5850U.
The Deep Instinct Threat Research team monitored attack volumes and types and extrapolated their findings to predict where the future of cybersecurity is heading, determine what motivates attackers, and lays out the steps organizations can take now in order to protect themselves in the future.
Microsoft is calling attention to a surge in cyberattacks on Ukrainian civilian digital targets, warning that the new “digital war” includes destructive malware attacks on emergency response services and humanitarian aid efforts.
Just as Russia was preparing to launch an invasion of Ukraine, Ukrainian government websites were disrupted by DDoS attacks and cybersecurity firms reported seeing what appeared to be a new piece of malware on hundreds of devices in the country.
Scams and scandals are a dime a dozen in the crypto industry. Every morning as I open my crypto newspaper (aka Twitter), I’m almost guaranteed to find at least one piece of news relating to hacks, rug pulls, phishing attacks, wash-trading, compromised wallets, etc., across the crypto-verse. However, this is expected as most blockchains, cryptocurrencies, […]
This article was published as a part of the Data Science Blogathon. Introduction As a part of writing a blog on the ML or DS topic, I selected a problem statement from Kaggle which is Microsoft malware detection. Here this blog explains how to solve the problem from scratch. In this blog I will explain to […]
IoT devices are now standard consumer and commercial technology. Their growing availability and often poor security means they have emerged as a significant...