United States creates cybersecurity center to help study cyber threats

Michael Hatamoto | Hacking, Security & Privacy | Feb 10, 2015 2:04 PM CST

The United States publicly unveiled its Cyber Threat Intelligence Integration Center (CTIIC), a new program designed to study cyber threats facing government agencies.

The idea of increased communication between federal government agencies, law enforcement and private sector corporations seems like a wise idea - but is going to be extremely difficult. The CTIIC wants to create a first step towards that goal, with government agencies and law enforcement coordinating to discuss current cyberattack patterns.

Even though the US government is being pressured to become more proactive in the fight against cyberattacks, some have questioned if the CTIIC will be an effective tool. "In principle, having a single 'belly button' is a nice idea," said Jeff Williams, CTO and founder of Contrast Security, in a statement to NBC News. "But in reality, it's just one more agency with cybersecurity responsibility."

Continue reading: United States creates cybersecurity center to help study cyber threats (full post)

The 'CyberCaliphate' hacks Newsweek, other Twitter feeds

Michael Hatamoto | Hacking, Security & Privacy | Feb 10, 2015 12:43 PM CST

The main Twitter page for Newsweek was hacked by CyberCaliphate, a mysterious pro-ISIS group, with a new profile picture, main image and number of tweets posted. A series of tweets also took aim at the first lady Michelle Obama and her family, threatening them - and the FBI is now investigating the matter.

"We apologize to our readers for anything offensive that might have been sent from our account during that period, and are working to strengthen our newsroom security measures going forward," said Kira Bindrim, Managing Editor of Newsweek, in response to the data breach.

Newsweek was able to regain control of its Twitter account in 20 minutes, but the hijacked Twitter messages were tweeted and shared among the news organization's 2.51 million followers.

Continue reading: The 'CyberCaliphate' hacks Newsweek, other Twitter feeds (full post)

Apple will 'give Tesla a run for its money' with its latest project

Anthony Garreffa | Electric Vehicles & Cars | Feb 10, 2015 6:35 AM CST

An Apple employee has teased some exciting news with Business Insider, that the company is working on a new project that would "give Tesla a run for its money".

Business Insider reports: "After writing about how the van could be used for a self-driving car, we got an unsolicited email from an employee at Apple about "vehicle development" at the company. Apple's latest project is too exciting to pass up," the person said. "I think it will change the landscape and give Tesla a run for its money".

We know that Apple employees have been moving over to Tesla Motors in droves, but now it's being reported that Tesla employees are coming back to Apple for this mysterious project, which sounds like a stretch. If Apple were working a self-driving car, it could be a big deal, but a self-driving car consists of many technologies that need to work together perfectly, on its first shot. We'll continue to report on this as it breaks.

Continue reading: Apple will 'give Tesla a run for its money' with its latest project (full post)

AMD acknowledges that fake processors were sold through Amazon

Anthony Garreffa | CPU, APU & Chipsets | Feb 10, 2015 5:08 AM CST

AMD and NVIDIA have been in the headlines quite often lately, with AMD now in the headlines for something completely different. The chipmaker has acknowledged that some consumers have purchased counterfeit processors from Amazon.

The fake processors have heatspreaders that say that they are an FM2+ AMD A8-7600 but the CPU underneath of the heatspreader is just an older AMD APU, which is not compatible with the AM2+ motherboard at all. The CPU that most people seem to be securing is the very old AMD Athlon 64 X2 5200+ which will not work on current motherboards.

AMD has released a statement to Overlock3D, saying: "It is apparent that this isolated incident is not related in any way to AMD's manufacturing or packaging, however AMD takes any reports of product tampering very seriously. As part of our ongoing efforts to help ensure consumers and businesses are sold only genuine AMD processors, we thoroughly investigate these extremely rare incidents in an effort to determine the source of the altered products, and consider all available legal remedies - including both civil and criminal prosecution - against persons found to have engaged in fraudulent actions affecting AMD products".

Continue reading: AMD acknowledges that fake processors were sold through Amazon (full post)

TSMC is investing $16 billion in a new advanced chip factory

Anthony Garreffa | Business, Financial & Legal | Feb 10, 2015 2:04 AM CST

Some interesting news has just appeared online, but first we'll tackle the business side of things. TSMC has said that it is investing a hefty $16 billion on creating a new chip factory, but there was some more interesting news that didn't seem to make the headlines.

TSMC will never make a 20nm GPU, with the reasoning behind this is that there are very low yields associated with the big cores and high performance requirements. Starting next year the Taiwanese giant will switch over to 16nm FinFET, but it wants to shift into 10nm as early as late 2016.

Intel is another player in the 10nm business, where it has invested $6 billion in fabrication facilities over in Israel. The chipmaker has already invested into the R&D of 7nm, which should happen before 2020. TSMC shifting to 16nm and then 10nm so quickly is a pre-emptive move against Samsung and Globalfoundaries, which have just joined forces in the R&D side of things.

Continue reading: TSMC is investing $16 billion in a new advanced chip factory (full post)

Rigid tubing done differently - Math Military takes on carbon fiber

Chris Smith | Modding | Feb 9, 2015 9:04 PM CST

It seems that basically any large-scale build in this day and age is not complete without a full rigid-tubed liquid cooling loop. Besides wacky color schemes and cutting numerous holes in your chassis, what else can you do to truly set your system apart from the rest?

Math Military Modding has developed their own special method of water cooling design - real carbon fiber tubes. The images you can see are part of the latest update on the ASUS Strix modding project and help symbolize the projects goal, which is to be designed and built from the ground up - allowing for a scratch-built and completely custom project.

The carbon fiber tubes have been purchased from FlashRC and will be circulating coolant around the system. It looks very interesting and is quite light - but is it worth the cost or will it perform properly? That's up to you to decide.

Continue reading: Rigid tubing done differently - Math Military takes on carbon fiber (full post)

EA ponders a future in which tablets are more powerful than consoles

Michael Hatamoto | Gaming | Feb 9, 2015 6:55 PM CST

The tablet market is constantly changing, and each generation features newer and faster hardware being deployed in the mobile products. It's possible EA wants to try to win over casual tablet gamers and turn them into console and PC gamers, and that will require something beyond simple casual games that are racking up increased usage.

Most mobile games have focused on the casual sector, but that could change depending on how far hardware develops. EA and other game studios are trying to create gaming products so they can be used away from PCs and game consoles, and that could mean better developed, more immersive software titles in the future.

"What gets us the most excited is the power, the computing power, of mobile devices and the speed at which that's growing," said Blake Jorgensen, CFO of Electronic Arts, speaking during the 2015 Technology, Internet & Media Conference. "What that might mean is that a tablet, three or four years from now, has more power than what a typical console has. And that will open up a whole new set of people to console-style games that are much more immersive, much deeper, much more character-driven than simply a static mobile game that you might play for a small burst of time while you're waiting for the bus."

Continue reading: EA ponders a future in which tablets are more powerful than consoles (full post)

Chipotle apologizes after cyberattack leaves Twitter page defaced

Michael Hatamoto | Hacking, Security & Privacy | Feb 9, 2015 5:32 PM CST

Popular fast casual restaurant Chipotle has issued an apology to its Twitter followers, after being hacked over the weekend. Insensitive tweets were published to more than its 634,000 followers, including racist messages aimed at President Obama - before Twitter could suspend the account. A separate tweet claimed the company would be shutting restaurants before the end of the year.

The attack also reportedly hit the official Chipotle website, which led visitors to a different website.

"Our Twitter account was hijacked overnight for about two hours during which a series of offensive tweets was posted to the account," said Chris Arnold, communications director of Chipotle. "We apologize for the nature of the posts that were made during that time, and we are now conducting an investigation to try to determine what happened and who might have been involved."

Continue reading: Chipotle apologizes after cyberattack leaves Twitter page defaced (full post)

New York plans to conduct cybersecurity audits of insurers

Michael Hatamoto | Hacking, Security & Privacy | Feb 9, 2015 4:03 PM CST

In the aftermath of the Anthem data breach last week, the New York Financial Services Department said it plans to conduct cybersecurity audits of insurance companies. The "regular" and "targeted assessments" will be a part of its examination process, and enhanced regulations should keep New York insurance members safer from future data breaches.

The Anthem data breach could affect upwards of 80 million people, as personal information was taken during the sophisticated cyberattack.

"We're still in the process of finalizing and determining the enhanced requirements, but we are moving quickly and expect to begin putting them forward in the coming weeks," said Matt Anderson, spokesman of the New York Financial Services Department, in a statement published by Reuters. "These requirements are specific to New York, but we're of course always willing to discuss these issues with other states."

Continue reading: New York plans to conduct cybersecurity audits of insurers (full post)

Anonymous calls ISIS a 'virus,' promises to disrupt group online

Michael Hatamoto | Hacking, Security & Privacy | Feb 9, 2015 3:09 PM CST

The Anonymous hacker collective is taking aim at ISIS in Syria and Iraq, launching attacks to disrupt the group's social media accounts. As part of its #OpISIS campaign, Anonymous has taken down hundreds of Twitter, Facebook, and other social media accounts linked to ISIS - used to spread propaganda and woo potential recruits.

"ISIS: We will hunt you, take down your sites, accounts, emails and expose you," Anonymous pledges. "From now on, no safe place for you online... you will be treated like a Virus, and we are the cure. We own the Internet. We are Anonymous; we are Legion; we do not forgive, we do not forget. Expect us."

In addition to listing Twitter and Facebook accounts - of both compromised accounts and possible targets - Anonymous has revealed email addresses, IP addresses, VPN connections and websites used by the extremist group.

Continue reading: Anonymous calls ISIS a 'virus,' promises to disrupt group online (full post)