Archive for the ‘Mobile’ Category

Intel puts 8 cores, 16 threads, and a 5GHz turbo option in a laptop processor

April 23rd, 2019
Extreme close-up image of computer parts.

Enlarge / An eight-core/16-thread Coffee Lake die. (credit: Intel)

The first processors to include Intel's ninth-generation Core branding came out last year with a limited line-up: just a handful of high-end desktop processors in the Coffee Lake family. Today, the company has unveiled a bumper crop of new ninth-gen chips. There's a set of H-series processors for laptops and a complete range of desktop processors across the Celeron, Pentium, and Core brands, from i3 all the way to i9.

The most exciting of these are the mobile H-series parts and in particular the top-of-the-line Core i9-9980HK. This is a 45W processor with eight cores, 16 threads, and 16MB of cache, with a base clock speed of 2.4GHz and a turbo speed of 5GHz. The "K" on the name also indicates that the chip is overclockable: for those truly monstrous gaming laptops with high-powered cooling systems, you'll be able to go beyond the default speeds. This chip, along with its close partner, the i9-9880H (8C/16T, 2.3-4.8GHz), has a new feature called "Thermal Velocity Boost," too. TVB allows the chip to run 100MHz quicker if it detects that the system still has thermal headroom to do so; as long as case temperatures are below 50°C, it'll give you some extra speed. In fact, TVB is the only way to hit 5GHz; without it, the maximum turbo speed drops to 4.9GHz.

The chip will be good for powerhouse mobile workstations, too; it supports up to 128GB RAM when used with the latest 32GB DDR4 modules, and it can be paired with a discrete GPU using its 16 PCIe 3.0 lanes. Intel has dubbed these powerhouse laptops as "musclebooks;" they'll be hefty desktop replacements and are likely to be outfitted with oversized cooling systems in order to more consistently reach the high clock speeds their processors are capable of. They won't come cheap, though; the i9-9980HK has a recommended price of $583 for the processor.

Read 6 remaining paragraphs | Comments

Posted in 9th generation, Coffee Lake, Core, desktop, Intel, Mobile, processors, Tech | Comments (0)

Emoji 12.0 brings us waffles, more diversity, suggestive “finger pinch” glyph

February 6th, 2019

Emoji version 12.0 has been finalized by the Unicode Consortium, and for 2019 we're getting 230 new emoji. Although the standard is finalized, Apple, Google, Microsoft, and other platform vendors still need to create artwork and integrate these new glyphs into their respective platforms. Today we have a preview of what to expect thanks to Emojipedia, which put together a list of the new glyphs with example artwork.

There's a push for more diversity with this new emoji release. We have emojis for deaf people in three genders (male, female, and genderless) and five skin tones, an ear with a hearing aid, people in motorized and unmotorized wheelchairs, prosthetic arms and legs, a guide dog and a service dog, and people with a probing cane. There are actually only 59 distinct new emoji types in this release, but everything that depicts a human comes in five skin tones and three genders, which pumps up the numbers. You can really see this with the "People holding hands" emoji, which is completely configurable for a total of 70 possible combinations.

The emoji that's causing the most buzz is "pinching hand." Emojipedia's example shows a thumb and pointer finger with a small distance between them, which could also be interpreted as a hand signal for "small." People are already coming up with uh, "suggestive" uses for such a glyph, and if the actual implementations follow Emojipedia's design, the glyph could end up on the naughty list next to peach and eggplant.

Read 3 remaining paragraphs | Comments

Posted in Android, emojis, emojis emojis emojis, iOS, MFING EMOJIS YOU GUYS, Mobile, Tech | Comments (0)

Nintendo bringing Dr. Mario to iOS, Android this summer

February 1st, 2019
The logo for <em>Dar. Mario World</em>.

Enlarge / The logo for Dar. Mario World. (credit: Nintendo / Twitter)

Nintendo announced last night that it will be bringing the classic color-matching puzzle game Dr. Mario to Android and iOS devices in 60 countries as Dr. Mario World early this summer.

Nintendo said the game will be "free to download with optional in-app purchases," but didn't go into detail on how exactly the monetization system would work. Many mobile puzzle game (such as the Candy Crush series) use timer-based "energy" systems to limit the amount you can play without paying in a certain period. Nintendo has used similar cooldown timers in games like Animal Crossing: Pocket Camp and Fire Emblem Heroes, though other Nintendo-developed mobile titles have used other monetization methods.

Dr. Mario World is being co-developed by Line, a Japanese mobile developer mainly known for the messaging app of the same name. Nintendo had previously partnered with Line for sticker packs in that app, but had relied on a partnership with DeNA for games like Super Mario Run and Miitomo. Nintendo also owns a five percent share of mobile developer Cygames, which released action-RPG Dragalia Lost with Nintendo last year.

Read 2 remaining paragraphs | Comments

Posted in Android, dr. mario, Gaming & Culture, iOS, Mobile, Nintendo, puzzle | Comments (0)

Hands-on with the new Gmail for Android (and iOS)

January 30th, 2019

Google is pushing a big redesign to the mobile Gmail app on Android and iOS. The update was announced yesterday, and after spending some time with the new app, we're going to comb through the finer details and see what has changed between New Gmail and Old Gmail.

For now the release is only out on Android, but like the old Gmail design, it should look identical on iOS. If you're on Android, you want Gmail version 9.x (the old design is Gmail 8). If the Play Store isn't serving you the update and you're into sideloading, APKMirror has a safe download. The iOS version is still wending its way through the App Store approval process, and should be out sometime this week.

The new design is a good match for the new desktop Gmail design that came out in April, along with all the other apps using the "Google Material Theme" design language. Everything is really white—an homage to the Google homepage—and everything uses rounded corners. The horizontal line dividers are gone, leaving nothing but white space to separate your messages. Control iconography is changed to Google's new outline style, and while message text remains in the Roboto font, everything else now uses Product Sans (the same typeface as the Google logo).

Read 9 remaining paragraphs | Comments

Posted in Alphabet, Android, apps, gmail, google, iOS, Mobile, Tech | Comments (0)

Touchscreens ‘at risk from chip in the middle attack’, warn researchers

August 25th, 2017

Researchers call for manufacturers to recognize that compromised hardware is a real possibility

Posted in chip-in-the-middle attack, hardware threats, Mobile, supply chain | Comments (0)

Two-factor via your mobile phone – should you stop using it?

July 11th, 2017

Although SIM cards themselves are very secure, it’s annoyingly easy for a crook to get hold of one for your number

Posted in 2-factor Authentication, 2FA, data loss, Mobile, Security threats, sim swap, Vulnerability | Comments (0)

Two-factor via your mobile phone – should you stop using it?

July 11th, 2017

Although SIM cards themselves are very secure, it’s annoyingly easy for a crook to get hold of one for your number

Posted in 2-factor Authentication, 2FA, data loss, Mobile, Security threats, sim swap, Vulnerability | Comments (0)

The Trends & Challenges Facing The Internet Of Things

July 11th, 2017

The Internet of Things, or IoT, is now commonplace in society today. Since the term was first coined back in the 80’s, connected devices have changed our lives in ways many of us could only dream of. However, whilst the growth has been significant, integrating IoT devices into everyday life even further is not without its challenges. In this post, I’m going to look at some of the trends that will help take IoT integration even further, as well as some of the hurdles being faced.

Trends

Hands Free

Today, the most common way of interacting with IoT devices and electronics is primarily touch. However, the ability to use voice is shaking up how consumers and technology interact. Voice is making a significant impact on our everyday lives and it will continue to become more prominent as the technology evolves. Very recently, we’ve seen the introduction of Amazon’s Alexa and Google’s Home devices. With the likes of Siri, Cortana and Assistant already being used outside of smartphones and tablets, it will only be a matter of time before consumers are controlling their IoT devices by voice. It has even begun to make its way into cars, as we’ve seen with Nissan introducing Cortana to the dashboard interface. Using our hands could well become a thing of the past!

Big Data & Machine Learning

At the very core, big data and IoT need each other. Both are powerful trends that are reshaping the way consumers and businesses operate. However, the value of IoT for big tech firms isn’t just in the hardware, it also lies in the huge amounts of data the devices are producing. Data is becoming the ‘new oil’ and IoT devices increase the amount of data companies have on consumers, making them incredibly valuable. Companies will start to use Artificial Intelligence (AI) to analyse the huge pools of data allowing them to provide a much more tailored offering with devices eventually beginning to learn and adapt to how we use them. With AI integration, it gives companies the ability to analyse data and learn, with devices ultimately becoming automated — a fundamental shift in how consumers interact with their devices.

Challenges

Safety & Security

With more devices becoming connected and even more planned for the future, one of the biggest elements that needs to be addressed to make IoT a success is making sure devices are safe and secure. A recent report from Gartner predicted there will be 8.4 billion connected ‘things’ in 2017 and as many as 20 billion by 2020 — a huge amount of devices that if breached, could at the very least expose critical user data, but could also do much worse when we consider how connected hospitals and cities are becoming. If we take hospitals for example, an attack on the network could have huge ramifications on patients so as the reliability on technology increases, the security must mirror that. Looking at things much closer to home, implementing the right security platforms, like our Smart Home software will make sure cyber attacks on your connected devices in the home don’t happen.

Multiple Devices

As we’ve mentioned before, the exponential growth of IoT means more and more devices will be using a network, which will in turn place an incredible amount of strain on our networks. The result of an overburdened network could mean a drop in service, which is something most businesses and consumers would be keen to avoid. How many times has your internet connection dropped or your WiFi cut out for a few seconds? It’s not uncommon in the home today and the consequences are probably minimal, but imagine that happening for businesses — it could be catastrophic. Seamless integration is critical for the successful use of IoT.

To keep up-to-date with the latest cybersecurity news, take a look at the McAfee Security blog here.

The post The Trends & Challenges Facing The Internet Of Things appeared first on McAfee Blogs.

Posted in consumer, Internet of things, IoT, Mobile, smart home | Comments (0)

Amazon plans to check up on your price checks

June 19th, 2017

Thinking of shopping in one of Amazon’s new physical stores? Think twice about using their free Wi-Fi to do a price comparison while you’re there as a patent suggests they’ll be snooping on your browsing

Posted in amazon, comparison shopping, free Wi-Fi, Mobile, open Wi-Fi, public Wi-Fi, wi-fi | Comments (0)

How Using A VPN Could Save Your Summer

May 23rd, 2017

As summer inches closer, I begin to daydream about all the trips I’ll get to take with my family. However, whether our days are spent on the beach or walking around cities we’ve never explored, they all start the same: long-haul flights, airports, and hotels. While the Wi-Fi at the airport may claim to be secure in the network name, public Wi-Fi networks lack encryption, which scrambles the data being sent over the network. Without encryption, cybercriminals can intercept shared information and gain access to personal passwords, financials, or identity information.

Traveling often means I’ll be surrounded by (and connecting to) unfamiliar Wi-Fi networks, which makes it especially important to have a smart security solution in place for all my devices. I rely on two different tools to keep my devices and my family’s devices safe while we’re on the road. One is a personal VPN, which keeps my connections safe, even if I need to log into an insecure Wi-Fi network. Personal VPNs encrypt online activities in both public and secure Wi-Fi networks, allowing users to surf the web safely and feel at peace knowing that sensitive information will be kept private.

If you tend to spend a lot of browsing or doing work from your device while traveling, make sure to download security apps that protect your devices directly. It’s nice to have that extra layer of security, as these apps analyze the applications already installed on my phone that use my private information, and secure my data accordingly. If you’re traveling to cities where pickpocketing is common (or if you’re simply forgetful), many of the security apps also offer anti-theft protection that allow the user to back up, lock, and wipe the device remotely.

My family likes to travel to many different places in one vacation, which makes these apps perfect – since we’re bouncing between hotels or vacation rentals, we’re often surrounded by unknown networks. If your device has made an unknown connection, you’re potentially at risk of downloading fishy viruses or malware through the network. I’ve found that it’s always smart to have extra protection if your devices have a higher chance of making an insecure connection.

While these tools are important to have, we’ve learned that technology can occasionally fail us. One of the most trustworthy ways to keep your devices safe while jet-setting around this summer is to understand what an insecure Wi-Fi connection looks like. If you can determine whether the connections around you are safe or not, it will potentially save you and your loved ones a massive headache down the road. Look out for these warning signs of an insecure network, and stay away from connecting if the network looks suspicious.

  • Check the Authenticity. If there is no WPA or WP2 password for protected access, the connection is open, or unencrypted. You can check the authenticity of the network by going into internet settings and looking to see if it’s protected with a WPA or WPA2, or if it says it’s “open.”
  • HTTP vs. HTTPS? Make sure that the web pages you visit are “HTTPS” encrypted whenever possible. Do this by looking at the beginning of the URL you are accessing – if the URL starts with “HTTP”, log out – particularly if you’re doing something sensitive.
  • Pay Attention to the Warning Signs. SSL and TLS warnings are the messages that pop up in your browser when you’re in danger of connecting to an insecure connection – and it’s likely that you’ve clicked through the notification without a second thought. Take a moment to think about what you’re agreeing to before moving past the notifications next time, because it could mean you’re putting your devices in danger.
  • Be Picky. Don’t set your device to automatically connect to Wi-Fi networks. Rather, make sure your laptops, tablets, or smartphones will “forget” certain networks when you disconnect, and that they’ll only reconnect when you choose to do so manually.

From the “secure Wi-Fi” you find at the airport and airplane, to whatever you can connect to in your hotel or vacation rental, it’s smart to have a secure solution if you plan to stay connected while traveling.  Know the warning signs of an insecure Wi-Fi connection and use a personal VPN and/or mobile security solution whenever possible to keep your data as protected as possible. Have a secure summer, and happy travels!

Looking for more mobile security tips and trends? Be sure to follow @McAfee_Home on Twitter, and like us on Facebook.

The post How Using A VPN Could Save Your Summer appeared first on McAfee Blogs.

Posted in consumer, McAfee Mobile Security, Mobile, Mobile Security | Comments (0)