Connect with us

Google Pixel 6 with SoC Tensor showed its capabilities for the first time in the benchmark

Published

on

A few days before the official presentation, the standard version of the Google Pixel 6 smartphone was first tested in the popular Geekbench benchmark application.

The Google Pixel 6 will be the first Google smartphone to use its proprietary Tensor SoC. According to Google, the Pixel 6 series will be far ahead of any smartphones the company has released in the past. Geekbench confirms that this device will ship with a Mali G78 GPU. The Google Pixel 6 scored 1027 points in the single-core test, as well as 2706 points when using all cores.

The single-core test score is higher than the Snapdragon 888 SoC, while the Tensor’s multi-core score is lower. The tested model is equipped with 8 GB of RAM.

Yesterday, sources published spy photos of the Google Pixel 6 and Pixel 6 Pro showing the design of the bezels of smartphones. Photos confirm that the smartphones have received a single hole for the front camera, while the Google Pixel 6 has wider bezels around the perimeter than the Google Pixel 6 Pro. The older model has a slightly curved screen at the sides, and the chin is about the same as that of the Google Pixel 6.

The Pixel 6 and Pixel 6 Pro will be unveiled on October 19 and can be viewed at this link.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Security

PT Network Attack Discovery detects 33 more suspicious network activities

Published

on

Positive Technologies has released a new release of the PT Network Attack Discovery (PT NAD) 10.2 traffic analysis system.

Positive Technologies has released a new release of the traffic analysis system PT Network Attack Discovery (PT NAD) 10.2, which automatically detects the types and roles of network nodes, detects scan, flood and DDoS attacks, and processes traffic losslessly at speeds up to 10 Gbps.

Detection of new threats

In PT NAD 10.2, the number of detected suspicious activities has been increased by 9 times – there are 37 of them now. All of them are displayed in a single feed [1]to help users respond faster to detected threats. The feed collects threats identified using analytics modules (non-signature method) on one page and makes it possible to manage them. PT NAD users will now know in a timely manner when:

Credentials are transmitted to the network in clear text (which can be used by an attacker during an attack);

· Active VPN and proxy servers are monitored (for example, if internal nodes access external OpenVPN or SOCKS5 proxy servers);

· Software for remote control is used (TeamViewer, AeroAdmin, RMS, etc.) or remote commands are executed using PsExec and PowerShell;

· There is malware activity on the network.

In addition, the Activity stream continues to display custom notifications, backtracking indicator of compromise messages, dictionary passwords, and information about unknown DHCP servers.


PT NAD’s activity feed includes 37 types of threats that require a response

PT NAD 10.2 has a built-in mechanism for detecting network scanning, flooding and DDoS attacks. During such attacks, many sessions are created on the company’s network. Instead of storing information about each connection separately, PT NAD now creates one session record and one attack record in the activity stream, which contains aggregated data about the entire attack session. Such a combination “saves” the system: protects against database overflow and increases the stability of the sensor.

Network Node Management: Roles and Types

In order for information security specialists to have complete information about which nodes are involved in the network interaction and how the network works as a whole, PT NAD began to automatically determine the types and roles of nodes. The type indicates whether a particular node is a server, printer, mobile device, or workstation. Role refers to a function that a device performs. Version 10.2 defines 15 roles, including DNS server, VPN, domain controller, proxy server, monitoring system. The user can manually reassign the device type and role.


With the help of the updated filter, the user can find the nodes of interest by IP address, type, role, group membership and other parameters

Knowledge of what constitutes a company’s infrastructure is necessary in order to properly protect it and accurately detect attacks in it., – comments Dmitry Efanov, head of development, PT NAD Positive Technologies… – This information in PT NAD gives security operators an understanding of what devices are on the network and what roles they play, thus helping to take inventory of the network.“.

Capture and analyze traffic

Starting with this version, PT NAD captures traffic on Linux using the DPDK engine (Intel library that provides the most efficient way to capture traffic on Linux among other mechanisms), which processes it losslessly at a speed of tens of gigabits per second.

For greater transparency of internal traffic, PT NAD 10.2 has expanded the list of defined and parsed protocols. The updated system now parses all existing SQL data transfer protocols: MySQL, PostgreSQL, Transparent Network Substrate from Oracle and Tabular Data Stream (the ability to detect it was added in the previous release). PT NAD also defines the protocols of the Elasticsearch system and PostScript printing – with the help of the latter, printers on the corporate network communicate. The total number of detected protocols has reached 86.

Other UX improvements

A number of changes in PT NAD 10.2 are aimed at improving the usability of the product. Now you can find out from the interface about the current status and validity of the license and add or change it yourself. Added the option to copy the link to the card of a specific session or attack, in order to quickly exchange information with other users.

[1] Added in release PT NAD 10.1

Continue Reading

Electric Cars

Huawei and BAIC electric vehicle with HarmonyOS, HiSilicon Kirin and Arcfox Alpha S self-driving system to go on sale this year

Published

on

Earlier this year, Huawei unveiled its new Arcfox Alpha S electric vehicle, co-developed with BAIC and powered by the HarmonyOS operating system. The company has now officially announced that the first Arcfox Alpha S vehicles will go on sale in the fourth quarter of this year.

The Arcfox Alpha S is the result of a partnership between the Chinese tech giant and the automotive brand to create an advanced vehicle with autonomous driving capabilities. The Alpha S was preceded by an investment of over a billion dollars in research and development of electric vehicles for self-driving technology.

Despite the fact that Arcfox is produced under the BAIC trademark, the main features of the new electric car are HarmonyOS and the Huawei Inside system, which means that the car can move without the help of a driver. It also has a Huawei HiSilicon Kirin SoC.

Huawei has already demonstrated its L4 self-driving technology when the Arcfox Alpha S drove 1,000 kilometers through a busy Chinese city without any human intervention. The car managed to achieve this with the help of laser rangefinders, two dozen different radars and 12 cameras.

The car is offered at prices ranging from $ 60,000 to $ 66,000 in various trim levels.

Continue Reading

News

New hit on the e-scooter market: ebikeGo Rugged G1 and G1 + have been ordered by over 100,000 people

Published

on

In August this year, ebikeGo unveiled the Rugged G1 and G1 + rugged electric scooters specially designed for the Indian market. Not only are these scooters designed to withstand India’s rugged terrain, they also play a key role in the government’s drive to popularize electric vehicles.

Electric scooters have not yet rolled off the assembly line, but the company began accepting orders for ruggedized scooters immediately after the announcement. The Indian firm said it has already received over 100,000 fully paid orders for these scooters.

The younger version costs $ 1080, and the older one is priced at $ 1215. The older version offers a power reserve of 160 km and two replaceable batteries with a capacity of 2 kW • h. The scooter is equipped with a 3 kW electric motor, which allows a maximum speed of 70 km / h.

New hit on the e-scooter market: ebikeGo Rugged G1 and G1 + have been ordered by over 100,000 people

There is an application support through which you can view the remaining battery charge, as well as unlock your scooter. The scooters received a 30-liter luggage compartment and a seven-year chassis warranty.

Continue Reading

Most Popular