Security-Portal.cz je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.

Kategorie

China is a mere three years behind TSMC in some chip technology

Computerworld.com [Hacking News] - 3 Září, 2024 - 10:31

China’s sophistication in some of its chip technology is approaching three years behind that of top chip manufacturer Taiwan Semiconductor Mfg. Co. (TSMC) despite the best efforts by the US to delay advancements through a broad strategy of trade restrictions.

Analysis done by a Tokyo-based company called TechanaLye found a processor from a new Huawei smartphone released in April rivals TSMC chips in processing capability, according to the findings reported in Nikkei Asia. TechanaLye makes it their business to disassemble electronic devices and analyze their component technology.

TechanaLye CEO Hiroharu Shimizu showed semiconductor circuit diagrams for two application processors for Huawei smartphones to Nikkei; one was from Huawei Technologies’ Pura 70 Pro, released in April, and one from a top Huawei smartphone model from 2021, according to the report.

Huawei subsidiary HiSilicon designed the Kirin 9010 chip from the Pura 70 Pro; it was mass-produced by Semiconductor Manufacturing International Corp. (SMIC), a major Chinese contract chipmaker. The other chip design analyzed and presented was a Kirin 9000 chip, also designed by HiSilicon but produced by TSMC.

SMIC’s 7-nanometer (nm) mass-produced chip is 118.4 square millimeters, while TSMC’s 5-nm chip is 107.8 sq. mm, according to the report. In general, a smaller nanometer size means higher performance and a smaller chip. However, TechanaLye found that TSMC’s Kirin 9000 chip and SMIC’s Kirin 9010 chip were nearly comparable in performance, though a difference in yield still exists.

Are US trade restrictions failing in intent?

The findings demonstrate that despite the Biden administration’s ban on exporting certain chip technology to China in an effort to stymie development there–fearing the nation’s growing geopolitical power—the nation continues to evolve its processor technology, buoyed by a surge of activity by in-country manufacturers, Shimizu noted.

“The US regulations so far have only slightly delayed Chinese innovation, while sparking efforts by the Chinese chip industry to boost domestic production,” he told Nikkei Asia, according to the report.

Indeed, HiSilicon, which designed about 14 of 37 semiconductors in the Pura 70 Pro, also is demonstrating improvements that show Chinese progression, according to Shimizu. Other device chips — such as those for memory, sensors, power supply, display, and other functions — were from other Chinese and foreign manufacturers, with the bulk of them, or 86 percent, produced in China.

Last October, the Biden administration issued new export controls that block US companies from selling advanced semiconductors as well as equipment used to make them to certain Chinese manufacturers unless they receive a special license.

Then in mid-December, the administration expanded those restrictions to include 36 additional Chinese chip makers from accessing US chip technology, including Yangtze Memory Technologies Corporation (YMTC), the largest contract chip maker in the world. The purpose behind the regulations, according to officials, is to deny China access to advanced technology for military modernization and human rights abuse.

The results of TechanaLye’s analysis show that US restrictions may only end up affecting cutting-edge processors for servers aimed at advancing technologies such as artificial intelligence (AI) and not trickle down to technology such as smartphones, according to Shimizu.

“As long as the chips do not pose a military threat, the US is probably allowing their development,” he told Nikkei.

Further advancement would cause a ripple effect

Though it’s too soon to know if and when China will catch up to TSMC and other top manufacturers in its development of processors, if it does, it would “represent a significant shift in the global semiconductor landscape,” noted Akshat Vaid, partner, Everest Group. This likely would cause a ripple effect on global competition, geopolitics, technology, and economics.

“Such a development would diversify the semiconductor supply chain, reducing reliance on a few vendors and lessening the impact of regional disruptions,” he told Computerworld.

China’s advancement in the space also could tip the geopolitical balance in technology and trade, and create even more competition and conflict between China and Western nations, “given the strategic importance of the semiconductor industry and its broader implications for other sectors,” Vaid said.

This ultimately could spur disruptive changes in semiconductor supply-chain strategies and new policies to support domestic semiconductor industries or regulate technology transfer, security, and trade concerns, he added.

Kategorie: Hacking & Security

Secrets Exposed: Why Your CISO Should Worry About Slack

The Hacker News - 3 Září, 2024 - 09:30
In the digital realm, secrets (API keys, private keys, username and password combos, etc.) are the keys to the kingdom. But what if those keys were accidentally left out in the open in the very tools we use to collaborate every day? A Single Secret Can Wreak Havoc Imagine this: It's a typical Tuesday in June 2024. Your dev team is knee-deep in sprints, Jira tickets are flying, and Slack is
Kategorie: Hacking & Security

Secrets Exposed: Why Your CISO Should Worry About Slack

The Hacker News - 3 Září, 2024 - 09:30
In the digital realm, secrets (API keys, private keys, username and password combos, etc.) are the keys to the kingdom. But what if those keys were accidentally left out in the open in the very tools we use to collaborate every day? A Single Secret Can Wreak Havoc Imagine this: It's a typical Tuesday in June 2024. Your dev team is knee-deep in sprints, Jira tickets are flying, and Slack is The Hacker Newshttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

New Flaws in Microsoft macOS Apps Could Allow Hackers to Gain Unrestricted Access

The Hacker News - 3 Září, 2024 - 06:01
Eight vulnerabilities have been uncovered in Microsoft applications for macOS that an adversary could exploit to gain elevated privileges or access sensitive data by circumventing the operating system's permissions-based model, which revolves around the Transparency, Consent, and Control (TCC) framework. "If successful, the adversary could gain any privileges already granted to the affected
Kategorie: Hacking & Security

New Flaws in Microsoft macOS Apps Could Allow Hackers to Gain Unrestricted Access

The Hacker News - 3 Září, 2024 - 06:01
Eight vulnerabilities have been uncovered in Microsoft applications for macOS that an adversary could exploit to gain elevated privileges or access sensitive data by circumventing the operating system's permissions-based model, which revolves around the Transparency, Consent, and Control (TCC) framework. "If successful, the adversary could gain any privileges already granted to the affected Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Ex-Engineer Charged in Missouri for Failed $750,000 Bitcoin Extortion Attempt

The Hacker News - 3 Září, 2024 - 03:58
A 57-year-old man from the U.S. state of Missouri has been arrested in connection with a failed data extortion campaign that targeted his former employer. Daniel Rhyne of Kansas City, Missouri, has been charged with one count of extortion in relation to a threat to cause damage to a protected computer, one count of intentional damage to a protected computer, and one count of wire fraud. He was
Kategorie: Hacking & Security

Ex-Engineer Charged in Missouri for Failed $750,000 Bitcoin Extortion Attempt

The Hacker News - 3 Září, 2024 - 03:58
A 57-year-old man from the U.S. state of Missouri has been arrested in connection with a failed data extortion campaign that targeted his former employer. Daniel Rhyne of Kansas City, Missouri, has been charged with one count of extortion in relation to a threat to cause damage to a protected computer, one count of intentional damage to a protected computer, and one count of wire fraud. He was Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Nejvtipnější zadní vrátka do Windows za poslední rok. Virus komunikoval s centrálou pomocí DNS

Zive.cz - bezpečnost - 2 Září, 2024 - 18:45
Většina zadních vrátek do systému používá běžné HTTP(S) spojení. Jakmile tedy klepnete na zavirovanou přílohu v e-mailu, do systému se nainstaluje záškodnický klient a ten pak skrze WWW komunikuje s centrálním serverem, který jej konečně úkoluje, co má dělat. Může třeba rozesílat spam a zapojit se ...
Kategorie: Hacking & Security

Download the AI-infused enterprise applications Spotlight

Computerworld.com [Hacking News] - 2 Září, 2024 - 17:00

Download the September 2024 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, InfoWorld, and Network World.

Kategorie: Hacking & Security

RansomHub Ransomware Group Targets 210 Victims Across Critical Sectors

The Hacker News - 2 Září, 2024 - 15:33
Threat actors linked to the RansomHub ransomware group encrypted and exfiltrated data from at least 210 victims since its inception in February 2024, the U.S. government said. The victims span various sectors, including water and wastewater, information technology, government services and facilities, healthcare and public health, emergency services, food and agriculture, financial services,
Kategorie: Hacking & Security

RansomHub Ransomware Group Targets 210 Victims Across Critical Sectors

The Hacker News - 2 Září, 2024 - 15:33
Threat actors linked to the RansomHub ransomware group encrypted and exfiltrated data from at least 210 victims since its inception in February 2024, the U.S. government said. The victims span various sectors, including water and wastewater, information technology, government services and facilities, healthcare and public health, emergency services, food and agriculture, financial services, Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Buffer Overflow Exploits in Linux: Origins, Impact, and Countermeasures

LinuxSecurity.com - 2 Září, 2024 - 13:00
Buffer overflow vulnerabilities have long been one of the biggest headaches in computer security, especially on Linux operating systems that power everything from servers to smartphones. Linux admins must understand the origins and evolution of buffer overflows, not just academically; it's essential for securing our systems and our sensitive data.
Kategorie: Hacking & Security

The AI glasses market comes into focus

Computerworld.com [Hacking News] - 2 Září, 2024 - 12:00

According to credible rumors, Snap and Meta will soon unveil their next-generation AI glasses.

Snap might introduce its fifth-generation Spectacles at the Snap Partner Summit on Sept. 17. Features like a wider field of view and improved battery life could grace a production run of fewer than 10,000 units for developers. (The current 4th-generation Spectacles are also for developers only; Snap never sold them to the public.)

Meanwhile, Meta could well unveil its “Orion” project at its Connect conference, scheduled for Sept. 25-26. According to the latest tech chatter, Orion glasses are expected to be highly advanced augmented reality (AR) glasses with immersive technology and a design that makes them look like standard glasses. While Orion glasses won’t be available for sale right away, Meta is prepping around 1,000 units for demonstration and early developer exploration.

Both companies hope to kickstart a third-party developer ecosystem for high-quality AI-driven AR glasses that anyone can wear every day in polite society as ordinary eyeglasses. And while the developers are working on apps, the companies will work hard to bring down the costs of manufacturing the products.

This generation of glasses combines an AI voice assistant with AR holographic visuals plus all the features and functionality of Bluetooth earbuds (calls, podcasts, etc.). In theory, this is the Holy Grail of wearables — fantastic power, rich user interfaces, and invisible and inaudible to everyone around you. Wearing such glasses will make you feel like you know everything and are constantly aided by powerful AI.

Meanwhile, Meta’s Ray-Ban Meta glasses are the surprise hit of the year. The glasses look more or less like regular Ray-Bans but offer multimodal AI and an audio interface. They’re inexpensive because they don’t attempt visual output, only sound.

While the Ray-Ban Meta glasses are well-designed and well-made and equipped with quality speakers and microphones, the basic concept is easily replicable. Chinese companies accessing lower-cost components can make much cheaper glasses containing batteries, Bluetooth connectivity, speakers, microphones, and an app that connects to the hardware and gains access to generative AI (genAI) chatbots through APIs.

In other words, good-enough AI glasses are relatively easy and inexpensive to produce. That’s why the success of Ray-Ban Meta glasses has Chinese companies taking notice.

Wait, what’s happening in China?

Smaller Chinese companies are focused on the growing market for AI-powered smart glasses, aiming to compete directly with Ray-Ban Meta smart glasses. They’re coming from companies you probably never heard of:

  • Superhexa: Backed by Xiaomi, Superhexa is a Chinese startup that has launched “Jiehuan” branded AI glasses that provide access to large language models (LLMs) and offer voice-guided navigation and AI chat features.
  • Solos: Hong Kong-based Solos has introduced its AirGo Vision smart glasses, which enable voice access to Open AI’s ChatGPT. The glasses also have a detachable camera, which enables multimodal AI via GPT-4o.
  • Even Realities: This Shenzhen-based startup makes G1 glasses featuring LED microdisplays. Although they don’t have speakers, they do output information in the form of visible green text.
  • Liweike: Based in Hangzhou, China, this company developed smart AR glasses, unfortunately branded as Meta Lens S3 glasses. They integrate sports functionality with AI-powered voice interaction with the company’s AI chatbot. One standout feature is an integrated 120-degree ultra-wide 2K high-definition sports camera.
  • Sharge: This company’s OptoX AI Glasses have a camera, speakers, and all the trimmings. Users can access ChatGPT-4o by talking and listening. Also, they can function like a dashcam, constantly recording and deleting while retaining only the last 30 minutes of video, which you can watch or keep.

As you can tell from this list, some companies are making audio-only AI glasses, some of which will cost less than $100. Other glasses add holographic heads-up displays, which could cost a few hundred dollars a pair. At least two of these products offer both cameras and interaction with the advanced GPT-4o chatbot, able to essentially do all the stuff from the May 13 OpenAI Spring Update (everything, of course, except get Scarlett Johansson’s voice), but through glasses instead of a smartphone.

Great glasses or cheap glasses?

To oversimplify the coming AI glasses market, the American companies will make them great, and the Chinese companies will make them cheap. The result will be an incredible selection of variable features, quality, and styles.

As a result, we’ll quickly arrive at a place where the question won’t be, “Why buy AI glasses?” It’ll be: “If you’re going to buy glasses, why wouldn’t you buy AI glasses?”

The AI glasses revolution will also eviscerate the in-the-ear earbud market and might damage the smartwatch industry. With audio in your glasses, why put plastic in your ears? And with apps, notifications, and information hovering holographically in space in front of your eyeballs, who needs it on your wrist.

Smartphones could even be affected. If a big holographic display in the lenses provides the main interface, then a big-screen smartphone might be unnecessary.

The emergence of AI glasses as a ubiquitous category creates interesting and valuable possibilities for enterprise and business apps running on the platforms, everything from factory training and instructions to board room presentation teleprompters.

Beyond that, we might eventually see the rise of BYOG — bring your own glasses — policies. Companies will also need to cope with this generation of glasses’ privacy and security implications. The prescription glasses employees rely on to see clearly will often have cameras and microphones capable of secretly recording anything. (Even Ray-Ban Meta glasses have a bright light that indicates when the camera is taking a picture or recording video, a system easily foiled, according to hundreds of how-to videos on TikTok.)

Social implications will abound. Today, we’re still trying to figure out the social norms around looking at a smartphone during a conversation. What happens when people can be looking right at you but secretly distracted by online content only they can see?

AI glasses are about to significantly impact business, society, and culture. This will become clear when Snap and — more importantly — Meta will likely demonstrate the future of AI glasses to developers and the public.

Kategorie: Hacking & Security

Webinar: Learn to Boost Cybersecurity with AI-Powered Vulnerability Management

The Hacker News - 2 Září, 2024 - 10:55
The world of cybersecurity is in a constant state of flux. New vulnerabilities emerge daily, and attackers are becoming more sophisticated. In this high-stakes game, security leaders need every advantage they can get. That's where Artificial Intelligence (AI) comes in. AI isn't just a buzzword; it's a game-changer for vulnerability management. AI is poised to revolutionize vulnerability
Kategorie: Hacking & Security

Webinar: Learn to Boost Cybersecurity with AI-Powered Vulnerability Management

The Hacker News - 2 Září, 2024 - 10:55
The world of cybersecurity is in a constant state of flux. New vulnerabilities emerge daily, and attackers are becoming more sophisticated. In this high-stakes game, security leaders need every advantage they can get. That's where Artificial Intelligence (AI) comes in. AI isn't just a buzzword; it's a game-changer for vulnerability management. AI is poised to revolutionize vulnerability The Hacker Newshttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Next-Generation Attacks, Same Targets - How to Protect Your Users' Identities

The Hacker News - 2 Září, 2024 - 09:00
The FBI and CISA Issue Joint Advisory on New Threats and How to Stop Ransomware Note: on August 29, the FBI and CISA issued a joint advisory as part of their ongoing #StopRansomware effort to help organizations protect against ransomware. The latest advisory, AA24-242A, describes a new cybercriminal group and its attack methods. It also details three important actions to take today to mitigate
Kategorie: Hacking & Security

Next-Generation Attacks, Same Targets - How to Protect Your Users' Identities

The Hacker News - 2 Září, 2024 - 09:00
The FBI and CISA Issue Joint Advisory on New Threats and How to Stop Ransomware Note: on August 29, the FBI and CISA issued a joint advisory as part of their ongoing #StopRansomware effort to help organizations protect against ransomware. The latest advisory, AA24-242A, describes a new cybercriminal group and its attack methods. It also details three important actions to take today to mitigate The Hacker Newshttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Malicious npm Packages Mimicking 'noblox.js' Compromise Roblox Developers’ Systems

The Hacker News - 2 Září, 2024 - 05:36
Roblox developers are the target of a persistent campaign that seeks to compromise systems through bogus npm packages, once again underscoring how threat actors continue to exploit the trust in the open-source ecosystem to deliver malware. "By mimicking the popular 'noblox.js' library, attackers have published dozens of packages designed to steal sensitive data and compromise systems," Checkmarx
Kategorie: Hacking & Security

Malicious npm Packages Mimicking 'noblox.js' Compromise Roblox Developers’ Systems

The Hacker News - 2 Září, 2024 - 05:36
Roblox developers are the target of a persistent campaign that seeks to compromise systems through bogus npm packages, once again underscoring how threat actors continue to exploit the trust in the open-source ecosystem to deliver malware. "By mimicking the popular 'noblox.js' library, attackers have published dozens of packages designed to steal sensitive data and compromise systems," CheckmarxRavie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security
Syndikovat obsah