AMD Ryzen Threadripper Launched: Performance Benchmarks Vs Intel Skylake-X

Reader MojoKid writes: AMD continues its attack on the desktop CPU market versus Intel today, with the official launch of the company’s Ryzen Threadripper processors. Threadripper is AMD’s high-end, many-core desktop processor, that leverages the same Zen microarchitecture that debuted with Ryzen 7. The top-end Ryzen Threadripper 1950X is a multi-chip module featuring 16 processor cores (two discrete die), with support for 32 threads. The base frequency for the 1950X is 3.4GHz, with all-core boost clocks of up to 3.7GHz. Four of the cores will regularly boost up to 4GHz, however, and power and temperature permitting, those four cores will reach 4.2GHz when XFR kicks in. The 12-core Threadripper 1920X has very similar clocks and its boost and XFR frequencies are exactly the same. The Threadripper 1920X’s base-clock, however, is 100MHz higher than its big brother, at 3.5GHz. In a litany of benchmarks with multi-threaded workloads, Threadripper 1950X and 1920X high core-counts, in addition to strong SMT scaling, result in the best multi-threaded scores seen from any single CPU to date. Threadripper also offers massive amounts of memory bandwidth and more IO than other Intel processors. Though absolute power consumption is somewhat high, Threadrippers are significantly more efficient than AMD’s previous-generation processors. In lightly-threaded workloads, Threadripper trails Intel’s latest Skylake-X CPUs, however, which translates to lower performance in applications and games that can’t leverage all of Threadripper’s additional compute resources. Threadripper 1950X and 1920X processors are available starting today at $999 and $799, respectively. On a per-core basis, they’re less expensive than Intel Skylake-X and very competitively priced. Read more of this story at Slashdot.

View original post here:
AMD Ryzen Threadripper Launched: Performance Benchmarks Vs Intel Skylake-X

Cisco Meraki Loses Customer Data in Engineering Gaffe

Cisco has admitted to losing customer data during a configuration change its enginners applied to its Meraki cloud managed IT service. From a report: Specific data uploaded to Cisco Meraki before 11:20 am PT last Thursday was deleted after engineers created an erroneous policy in a configuration change to its US object storage service, Cisco admitted on Friday. The company did say that the issue has been fixed, and while the error will not affect network operations in most cases, it admitted the faulty policy “but will be an inconvenience as some of your data may have been lost.” Cisco hasn’t said how many of its 140, 000+ Meraki customers have been affected. The deleted data includes custom floor plans, logos, enterprise apps and voicemail greetings found on users’ dashboard, systems manager and phones. The engineering team was working over the weekend to find out whether the data can be recovered and potentially build tools so that customers can find out what data has been lost. Read more of this story at Slashdot.

Original post:
Cisco Meraki Loses Customer Data in Engineering Gaffe

Startup Unveils Revolutionary New Rechargeable Alkaline Batteries

Slashdot reader cdreimer quotes the New York Times: Alkaline batteries can be made far more cheaply and safely than today’s lithium-ion batteries, but they are not rechargeable… Ionic Materials could change that equation with an alkaline battery the company said could be recharged hundreds of times. One additional benefit of the company’s breakthrough: An alkaline battery would not be as prone to the combustion issues that have plagued lithium-ion batteries in a range of products, most notably some Samsung smartphones. Cheaper and more powerful batteries are also considered by many to be the driver needed to make the cost of renewable energy technologies like wind and solar competitive with the coal, gas and nuclear power that support the national energy grid. The company “has demonstrated up to 400 recharge cycles for its prototypes, ” and it’s now even investigating aluminum-based alkaline batteries which would also be lighter than lithium-ion batteries. The company is backed by Sun Microsystems co-founder Bill Joy, who also envisions the batteries being used in electric cars. Read more of this story at Slashdot.

Read the original post:
Startup Unveils Revolutionary New Rechargeable Alkaline Batteries

Font Maker Sues Universal Music Over ‘Pirated’ The Vamps Logo

An anonymous reader writes: Universal Music Group is being sued by HypeForType, which accuses the record label of using “pirated” copies of its fonts for the logo of The Vamps. The font is widely used for artwork, promotion material and merchandising of the popular British band, and the font creator is looking for a minimum of $1.25 million in damages. The font maker has filed a lawsuit accusing the major label of using its “Nanami Rounded” and “Ebisu Bold” fonts without permission. According to a complaint, filed in a New York federal court, Universal failed to obtain a proper license for its use, so they are essentially using pirated fonts. Read more of this story at Slashdot.

More:
Font Maker Sues Universal Music Over ‘Pirated’ The Vamps Logo

Amazon Suspends Sales of Blu Android Phones Due To Privacy Concerns

CNET reports: Amazon just put budget phone maker Blu in the penalty box. The online retailing giant told CNET that it was suspending sales of phones from Blu, known for making ultra-cheap Android handsets, due to a “potential security issue.” The move comes after security firm Kryptowire demonstrated last week how software in Blu’s phones collected data and sent it to servers in China without alerting people. Blu defended the software, created by a Chinese company called Shanghai Adups Technology, and denied any wrongdoing. A company spokeswoman said at the time it “has several policies in place which take customer privacy and security seriously.” She added there had been no breaches. Blu said it was in a process of review to reinstate the phones at Amazon. Read more of this story at Slashdot.

Originally posted here:
Amazon Suspends Sales of Blu Android Phones Due To Privacy Concerns

AT&T Loses Record Number of Traditional TV Subscribers In Q2, Drops 156,000 DirecTV Satellite Customers

According to Variety, AT&T’s pay-TV business has lost a record 351, 000 traditional video customers in the second quarter, with the internet-delivered DirecTV Now service failing to fully offset the losses. From the report: In Q2, historically a seasonally weak period for the pay-TV business, DirecTV’s U.S. satellite division lost 156, 000 customers sequentially, dropping to 20.86 million, compared with a gain of 342, 000 in the year-earlier quarter. AT&T’s U-verse lost 195, 000 subs in the quarter, which was actually an improvement over the 391, 000 it lost in Q2 of 2016. AT&T touted that it gained 152, 000 DirecTV Now customers in Q2, after adding just 72, 000 in the first quarter of 2017. Overall, it had signed up 491, 000 DirecTV Now subs as of the end of June, after the OTT service launched seven months ago. Read more of this story at Slashdot.

More:
AT&T Loses Record Number of Traditional TV Subscribers In Q2, Drops 156,000 DirecTV Satellite Customers

Fourth Ethereum Platform Hacked This Month: Hacker Steals $8.4 Million From Veritaseum Platform

An anonymous reader writes: “Veritaseum has confirmed today that a hacker stole $8.4 million from the platform’s ICO on Sunday, July 23, ” reports Bleeping Computer. “This is the second ICO hack in the last week and the fourth hack of an Ethereum platform this month. An ICO (Initial Coin Offering) is similar to a classic IPO (Initial Public Offering), but instead of stocks in a company, buyers get tokens in an online platform. Users can keep tokens until the issuing company decides to buy them back, or they can sell the tokens to other users for Ethereum. Veritaseum was holding its ICO over the weekend, allowing users to buy VERI tokens for a product the company was preparing to launch in the realm of financial services.” The hacker breached its systems, stole VERI tokens and immediately dumped them on the market due to the high-demand. The hacker made $8.4 million from the token sale, which he immediately started to launder. In a post-mortem announcement, Middleton posted online today, the Veritaseum CEO said “the amount stolen was miniscule (less than 00.07%) although the dollar amount was quite material.” The CEO also suspects that “at least one corporate partner that may have dropped the ball and [might] be liable.” Previous Ethereum services hacks include Parity, CoinDash, and Classic Ether Wallet. Read more of this story at Slashdot.

See the original post:
Fourth Ethereum Platform Hacked This Month: Hacker Steals $8.4 Million From Veritaseum Platform

Exploit Derived From EternalSynergy Upgraded To Target Newer Windows Versions

An anonymous reader writes: “Thai security researcher Worawit Wang has put together an exploit based on ETERNALSYNERGY that can also target newer versions of the Windows operating system, ” reports Bleeping Computer. “ETERNALSYNERGY is one of the NSA exploits leaked by the Shadow Brokers hacking group in April this year. According to a Microsoft technical analysis, the exploit can allow an attacker to execute code on Windows machines with SMB services exposed to external connections. The exploit works up to Windows 8. According to Microsoft, the techniques used in the original ETERNALSYNERGY exploit do not work on newer platforms due to several kernel security improvements. Wang says his exploit targets the same vulnerability but uses a different exploitation technique. His method ‘should never crash a target, ‘ the expert says. ‘Chance should be nearly 0%, ‘ Wang adds.” Combining his exploit with the original ETERNALSYNERGY exploit would allow a hacker to target all Windows versions except Windows 10. This is about 75% of all Windows PCs. The exploit code is available for download from Wang’s GitHub or ExploitDB. Sheila A. Berta, a security researcher for Telefonica’s Eleven Paths security unit, has published a step-by-step guide on how to use Wang’s exploit. Read more of this story at Slashdot.

View article:
Exploit Derived From EternalSynergy Upgraded To Target Newer Windows Versions

SoundCloud Has Enough Money To Survive Only 80 Days, Report Claims

Last week, SoundCloud announced it is cutting about 40 percent of its staff and closing two offices. Now, a report from TechCrunch claims “the layoffs only saved the company enough money to have runway ‘until Q4’ — which begins in just 80 days.” From the report: That seems to conflict with the statement Ljung released alongside the layoffs, which noted that, “With more focus and a need to think about the long term, comes tough decisions.” The company never mentioned how short its cash would still last. We reached out to Ljung and SoundCloud for this story and PR responded to the request reiterating Ljung blog post. After being presented with the leaked information from the all-hands, SoundCloud PR admitted that, “We are fully funded into Q4, ” though it says it’s in talks with potential investors. But further funding would require faith in SoundCloud that its own staff lacks. When asked about morale of the remaining team, one employee who asked to remain anonymous told TechCrunch “it’s pretty shitty. Pretty somber. I know people who didn’t get the axe are actually quitting. The people saved from this are jumping ship. The morale is really low.” Read more of this story at Slashdot.

Read More:
SoundCloud Has Enough Money To Survive Only 80 Days, Report Claims

Author of Original Petya Ransomware Publishes Master Decryption Key

An anonymous reader writes: The author of the original Petya ransomware — a person/group going by the name of Janus Cybercrime Solutions — has released the master decryption key of all past Petya versions. This key can decrypt all ransomware families part of the Petya family except NotPetya, which isn’t the work of Janus, but is believed to be the work of a nation-state actor that targeted Ukraine. Most (original) Petya campaigns happened in 2016, and very few campaigns have been active this year. Users that had their files locked have wiped drives or paid the ransom many months before. The key will only help those victims who cloned their drives and saved a copy of the encrypted data. Experts believe that Janus released Petya’s decryption key as a result of the recent NotPetya outbreak, and he might have decided to shut down his operation to avoid further scrutiny, or being accused of launching NotPetya. Read more of this story at Slashdot.

Continue Reading:
Author of Original Petya Ransomware Publishes Master Decryption Key