By continuing to use the site or forum, you agree to the use of cookies, find out more by reading our GDPR policy

Serial leaker 'momomo_us' has spotted multiple entries of AMD Radeon and Nvidia GeForce graphics cards by Gigabyte on the Eurasian Economic Commission(EEC)'s website. Among the mix of several GPU models getting certified, there are entries of the upcoming AMD's Radeon 5500 XT and Nvidia's GeForce GTX 1660/1650 Super graphics card SKUs. From the listing, it is noteworthy that the Radeon RX 5500 XT is equipped with 8GB of VRAM while the GeForce GTX 1660 and 1650 Super cards have 6GB and 4GB VRAM, respectively, just like their non-Super variants. Earlier today, Videocardz reported that they have received confirmation of an October 7th announcement for the Radeon RX 5500 XT as well the 5500M that we reported about a few days ago. They further added that the 5500 XT is powered by 22 RDNA Compute Units(CUs) or 1408 RDNA Stream processors. This means that the XT chip allegedly has the same CU count as the 5500M. However, the 5500 XT, being a desktop variant, maybe clocked much higher than its mobile counterpart. Over on the Nvidia side, it was first reported by Chinese website Mydrivers that a GeForce GTX 1660 Super variant was in the works with the same 1408 CUDA core configuration as the non-Super variant. However, the big change is that the Super card gets a beefed-up memory configuration thanks to the use of GDDR6 memory instead of GDDR5 on the non-Super 1660. This means that despite having the same core specification, the 1660 Super should be much faster in bandwidth bound scenarios. Another Chinese website ITHome reports that the GTX 1660 Super is due for launch on October 29. Videocardz speculates that the rumored 1650 Ti, also reported by Mydrivers previously, might well be the 1650 Super that has been listed at the EEC. Information on this GPU is still scarce with rumors floating around of it having anywhere between 1024 to 1280 CUDA cores. Learn more at OUR FORUM.

Windows 10 version 1909 codenamed ’19H2′, which is a minor update that is supposed to roll out later this year to all Windows 10 users, might arrive as early as next week. Windows 10 version 1909 is shipping to several Insiders on the Release Preview Ring and today ESDs for all languages have been spotted on WSUS. We have gathered the list of all available ESDs from private forums and according to the data, Windows 10 version 1909 Build 18363.356 ESD is currently available on Windows Server Update Services server (WSUS). The version number in ESD is listed as ‘18363.356.190918-2052.19h2’. The presence of ESD (electronic software delivery) on WSUS indicates this could well be the final release candidate (RTM). However, it’s likely that Microsoft won’t ship Build 18363.356 to the general public since a newer Build 18363.387 is available for Release Preview Ring testers. Microsoft is also holding an event on October 2 to announce Surface 7, Surface Pro 7, Surface Laptop 3 and Surface Centaurus. By the looks of things, Microsoft might announce Windows 10 version 1909 on October 2 and the update would begin rolling out on October 3 or sooner. Windows 10 19H2 won’t come with several new features, as Microsoft has focused more on performance and reliability areas of the OS in this release, including significant improvements for the Windows Update mechanism. Windows 10 19H2 doesn’t yet have a name and it’s unclear if it will be launched as ‘October 2019 Update’, retaining the traditional naming scheme. More information should be shared on October 2. According to Microsoft, this new version of Windows will install just like a regular patch for Windows 10 May 2019 Update PCs. We covered the key features of Windows 10 version 1909 in a previous article. One of the significant change is the implementation of a rotation policy that would distribute work more fairly on PCs with favored cores. This could boost performance and offer faster process execution. Follow this thread on OUR FORUM.

Windows ships with a full volume encryption tool called BitLocker. The feature used to trust any SSD that claimed to offer its own hardware-based encryption, but that changed in the KB4516071 update to Windows 10 released on September 24, which now assumes that connected SSDs don't actually encrypt anything. "SwiftOnSecurity" called attention to this change on September 26. The pseudonymous Twitter user then reminded everyone of a November 2018 report that revealed security flaws, such as the use of master passwords set by manufacturers, of self-encrypting drives. That meant people who purchased SSDs that were supposed to help keep their data secure might as well have purchased a drive that didn't handle its own encryption instead. Those people were actually worse off than anticipated because Microsoft set up BitLocker to leave these self-encrypting drives to their own devices. This was supposed to help with performance--the drives could use their own hardware to encrypt their contents rather than using the CPU--without compromising the drive's security. Now it seems the company will no longer trust SSD manufacturers to keep their customers safe by themselves. Here's the exact update Microsoft said it made in KB4516071: "Changes the default setting for BitLocker when encrypting a self-encrypting hard drive. Now, the default is to use software encryption for newly encrypted drives. For existing drives, the type of encryption will not change." People can also choose not to have BitLocker encrypt these drives, too, but the default setting assumes they don't want to take SSD manufacturers at their word. We have plenty more posted on OUR FORUM.

Microsoft and Cisco Talos identified a new malware which has affected thousands of computers in the US as well as in Europe. The companies stated that this malware has an ability to turn the PCs into proxies for performing malicious activity. This malware was named by Microsoft as Nodersok while the Cisco Talos called it Divergent. This threat has many of its own components to carry out malicious activities but it also takes advantage of existing tools. It should be mentioned that this malware leverages widely used Node.js framework and WinDivert, which is a user-mode packet capture-and-divert package for Windows 2008, Windows 7, Windows 8, Windows 10 and Windows 2016 to turn infected machines into proxies for malicious behavior. Microsoft and Cisco Talos both the companies released the threat report on this malware on Wednesday, September 25 in separate blog posts. As per the Microsoft researchers once Nodersok turns the systems into unwitting proxies "it uses them as "a relay to access other network entities (websites, C&C servers, compromised machines, etc.), which can allow them to perform stealthy malicious activities." While both the companies had a different opinion as to exactly what it does, Cisco Talos researchers said that "This malware can be leveraged by an attacker to target corporate networks and appears to be primarily designed to conduct click-fraud. It also features several characteristics that have been observed in other click-fraud malware, such as Kovter." The company believes that this malware is still to be in active development. Follow this thread to OUR FORUM to learn more.

Data-center companies face two pressing questions. First, how do they increase the density of computing power that high-performance systems need to support AI and machine learning? Second, how do data centers slash their carbon footprint in an environmentally aware market? Spanish company Submer believes it can help answer them both. With 40 clients in Europe and the US, Submer says it can cut the energy consumption of traditional air cooling and increase the viable density of high-performance computing by a factor of 10. Liquid submersion is common in the electric power-distribution infrastructure in components such as transformers, but it is rarely used for cooling IT hardware. In principle, submerging computer components is more efficient because liquids absorb more heat and take longer to heat up than air. The approach can also allow the overall system to run at higher temperatures because liquids help prevent hotspots that damage components. Obviously, it is important that liquid coolants do not conduct electricity. Although cold-plate liquid cooling is sometimes used in a closed system to cool the system chassis, immersing the whole system in liquid is almost unknown in computing. Submer was founded by Daniel Pope, a tech entrepreneur also behind Webhosting company Datahouse Internet, which he sold to Telefonica Group in 2010. He says one of the challenges to gaining acceptance in data centers was to build an immersive cooling system that could be easily managed in that environment. "The products that were out there had a very industrial approach and they really didn't look like something you'd place next to your racks. We designed a machine that is operated in a way that a data-center manager feels comfortable with." The other problem for industrial cooling liquids is compatibility with computing components – they can damage some of the plastic commons in server components. Founded in 2015, Submer has developed a dialectic fluid formula that Pope says can be manufactured anywhere in the world. Learn more from OUR FORUM.

The National Cyber Security Centre Finland (NCSC-FI) which acts as Finland's National Communications Security Authority published today a detailed guide on how to secure Microsoft Office 365 against data breaches and credential phishing. NCSC-FI's guide is focused on mitigating Microsoft Office 365 phishing which can lead to stolen credentials and to financial losses in the event of a successful Business Email Compromise (BEC) scam fraud that would use the stolen information. To put the seriousness of BEC attacks into perspective, FBI's Internet Crime Complaint Center (IC3) received victim complaints regarding 166,349 domestic and international incidents between June 2016 and July 2019, with a total exposed dollar loss of more than $26 billion according to a PSA issued on September 10. The same day, the U.S. Department of Justice (DoJ) said in a press release that 281 individuals were arrested over a four-month period in the U.S. and around the world as part of Operation reWired, a worldwide coordinated effort to disrupt BEC schemes. The first step to secure Office 365 against phishing and security breaches is to secure identities by customizing login pages to match the organization’s look, using hard to crack passwords, securing the local Active Directory, enabling modern authentication, blocking legacy email protocols without two-factor authentication (2FA) support, enabling 2FA, using conditional access, and carefully manage administrator roles. Next in line is securing Office 365 email accounts by securing email routing by rejecting emails that aren't sent over TLS and aren't sent by parties authenticated using certificates. Also, users should be secured against junk, malware, phishing emails, and zero-day attacks with the help of Office 365 Advanced Threat Protection (Office 365 ATP) via the ATP Safe Attachments, ATP Safe Links, and ATP Antiphishing features. To learn more and get the full guide to navigate to OUR FORUM.