Tag

Digital Transformation

Intel Reveals New Strategy for CPUs and GPUs, Ditches On-Package Memory
Hardware
Intel Reveals New Strategy for CPUs and GPUs, Ditches On-Package Memory

Intel has recently unveiled its future plans for its CPU and GPU lineups, focusing on the next-generation Arc GPUs and upcoming Panther Lake and Nova Lake CPU series. This announcement follows the company’s Q3 2024 earnings report, where CEO Pat Gelsinger outlined a strategic path aimed at revitalizing Intel’s product portfolio and boosting overall revenues. Shifting Away from On-Package Memory

Read More
Nigerian Man Sentenced to 26 Years for $12M Real Estate Phishing Scam
Cyber Security
Nigerian Man Sentenced to 26 Years for $12M Real Estate Phishing Scam

A Nigerian national named Kolade Akinwale Ojelade has been sentenced to over 26 years in a U.S. federal prison for orchestrating a sophisticated phishing scam that targeted the real estate industry and resulted in approximately $12 million in losses. Ojelade employed a ‘man-in-the-middle’ technique, intercepting emails between real estate businesses and their clients to redirect large payments to bank accounts

Read More
How Does the SYS01 Infostealer Exploit Meta Ads to Steal Logins?
Cyber Security
How Does the SYS01 Infostealer Exploit Meta Ads to Steal Logins?

The SYS01 infostealer malware represents a significant evolution in cyber threats, particularly in how it exploits Meta’s advertising platform to steal login credentials. This sophisticated threat employs deceptive advertising strategies to lure unsuspecting users into downloading malicious software, creating substantial risks for those using platforms like Meta for business purposes. The Deceptive Advertising Strategy Misleading Advertisements The SYS01 infostealer campaign

Read More
How Can You Assess and Improve Your Company’s Cybersecurity Posture?
Cyber Security
How Can You Assess and Improve Your Company’s Cybersecurity Posture?

If you’re an enterprise executive or cybersecurity specialist, you likely understand the increasing complexities of the threat environment. Cybercriminals continue to evolve their tactics, enhancing their arsenals to target organizations, interfere with business operations, and gain access to sensitive IT resources. As of February 2024, the global average data breach cost reached $4.88 million, up from $4.45 million the previous

Read More
Delay in CHIPS Act Funding Challenges Intel’s U.S. Manufacturing Efforts
Hardware
Delay in CHIPS Act Funding Challenges Intel’s U.S. Manufacturing Efforts

Intel, a frontrunner in the semiconductor industry, faces significant challenges due to delays in receiving $8.5 billion worth of funding it was promised by the CHIPS and Science Act. This legislative measure, aimed at boosting U.S. silicon production, was passed by Congress in mid-2022. Despite this, Intel’s CEO, Pat Gelsinger, recently voiced his frustration over the lack of financial support

Read More
Did the Columbus Ransomware Attack Compromise Resident Data Security?
Cyber Security
Did the Columbus Ransomware Attack Compromise Resident Data Security?

In a disconcerting turn of events, the city of Columbus, Ohio, has notified its 500,000 residents of a potential data breach following a ransomware attack that occurred in mid-July 2024. The initial response from city officials claimed that only corrupted data had been affected; however, security researcher David Leroy Ross, known as "Connor Goodwolf," later revealed that sensitive information had

Read More
Minisforum Launches MGA 1 External GPU with Radeon RX 7600M XT
Hardware
Minisforum Launches MGA 1 External GPU with Radeon RX 7600M XT

The Minisforum MGA 1 is a newly launched external GPU featuring an AMD Radeon RX 7600M XT GPU with 8 GB of VRAM, aimed at enhancing gaming, video editing, and 3D rendering capabilities. Its introduction marks a significant advancement in portable graphics solutions, specifically designed to augment the performance of mini-PCs and other devices requiring a boost in graphical processing

Read More
Regulating AI Advancements to Prevent a Potential Tech Bubble
AI and ML
Regulating AI Advancements to Prevent a Potential Tech Bubble

Recent pronouncements from industry leaders are likening the burgeoning artificial intelligence (AI) market to the precarious dotcom bubble of the 1990s. Robin Li, head of Baidu, suggests that an overwhelming majority of AI startups are destined to fail. Li has starkly warned that 99% of these startups are likely to collapse, with only a select few achieving meaningful economic and

Read More
How Is APT37 Threatening South Korean Cybersecurity?
Cyber Security
How Is APT37 Threatening South Korean Cybersecurity?

The cybersecurity landscape in South Korea is under a significant threat from APT37, a nefarious group backed by North Korea. This advanced persistent threat (APT) group has been conducting intricate reconnaissance operations targeting a variety of South Korean entities. Among their targets are North Korean human rights organizations, defectors, journalists, and experts involved in unification, national defense, and security matters.

Read More
How Will TBC’s Salom Card Change Digital Banking in Uzbekistan?
Digital Lending / Digital Payments
How Will TBC’s Salom Card Change Digital Banking in Uzbekistan?

TBC Bank Uzbekistan, renowned for being the largest mobile-only bank in the country, has launched its new flagship daily banking product, Salom Card. This initiative marks a significant milestone in TBC Uzbekistan’s strategic plan to expand its digital financial services while driving both customer and revenue growth. The introduction of Salom Card is initially exclusive to subscribers on a waiting

Read More
Ericsson Unveils 5G Advanced Software to Boost Network Performance
Networking
Ericsson Unveils 5G Advanced Software to Boost Network Performance

Ericsson has announced the launch of seven new 5G Advanced software solutions designed to significantly enhance the performance of current 5G networks. These software products are intended to equip operators with high-performing, programmable networks that aim to improve network performance, user experiences, revenue growth, and operational efficiency. Among the key offerings, real-time AI-powered automation stands out by boosting network performance

Read More
Can 5G Revolutionize Connectivity While Ensuring Robust Security?
Networking
Can 5G Revolutionize Connectivity While Ensuring Robust Security?

The transition to the fifth generation of wireless technology, known widely as 5G, represents a significant leap forward in terms of connectivity, speed, and capacity, vastly surpassing the advancements made by previous generations. Beyond merely enhancing the capabilities of its predecessor, 4G, 5G is set to revolutionize how societies operate, with its transformative potential touching various sectors from healthcare to

Read More