News Posts matching #secure boot

Return to Keyword Browsing

48-Core Russian Baikal-S Processor Die Shots Appear

In December of 2021, we covered the appearance of Russia's home-grown Baikal-S processor, which has 48 cores based on Arm Cortex-A75 cores. Today, thanks to the famous chip photographer Fritzchens Fritz, we have the first die shows that show us exactly how Baikal-S SoC is structured internally and what it is made up of. Manufactured on TSMC's 16 nm process, the Baikal-S BE-S1000 design features 48 Arm Cortex-A75 cores running at a 2.0 GHz base and a 2.5 GHz boost frequency. With a TDP of 120 Watts, the design seems efficient, and the Russian company promises performance comparable to Intel Skylake Xeons or Zen1-based AMD EPYC processors. It also uses a home-grown RISC-V core for management and controlling secure boot sequences.

Below, you can see the die shots taken by Fritzchens Fritz and annotated details by Twitter user Locuza that marked the entire SoC. Besides the core clusters, we see that a slum of cache connects everything, with six 72-bit DDR4-3200 PHYs and memory controllers surrounding everything. This model features a pretty good selection of I/O for a server CPU, as there are five PCIe 4.0 x16 (4x4) interfaces, with three supporting CCIX 1.0. You can check out more pictures below and see the annotations for yourself.

Marvell Launches a Vast Lineup of Networking PHYs: 2.5GbE, 5GbE, 10GbE, and Up

Marvell today announced an integrated set of access, aggregation and core Ethernet switch and PHY solutions that intelligently enable secure and efficient data movement throughout enterprise networks. The new portfolio is purpose-built to address the specific requirements of the borderless enterprise as mobility and cloud applications extend the boundaries of the traditional campus environment. Today's enterprise IT organizations are tasked with delivering a seamless experience - including to an ever-growing remote workforce - with zero-downtime, higher bandwidth performance for video and content sharing, and data protection and security. Marvell's unified Prestera Ethernet switch and Alaska PHY solution set is architected from the ground up with insightful telemetry, flow-aware intelligence, scalable performance and advanced integrated security technologies that set the bar in switching.

With a complete line of GE, 2.5GE, 5GE, 10GE, 25GE, 100GE and 400GE platforms, the portfolio is designed to fit a variety of network architectures at different speeds, densities and scales at small, medium and large enterprise IT organizations. This latest generation of solutions, comprised of four cutting-edge Prestera Ethernet switches and corresponding Alaska Ethernet PHYs, create a clear path to upgrade enterprise networks to multi-gigabit Ethernet in support of Wi-Fi 6 and 5G deployments. Marvell's intelligent workload management enables optimized data processing at or near the network access edge, improving the performance of hybrid cloud architectures. Insightful telemetry capabilities enable the solution to produce data that facilitates network automation and expedites forensic analytics. Advanced security features underpin trustworthiness and provide network embedded protection from ever-evolving security threats. To support emerging use cases in retail, manufacturing, hospitality, finance and education, Marvell's switching family is built with flexibility and feature richness to address the imminent needs these networks face.

Intel Announces iGPU-accelerated Threat Detection Technology

Today, Intel is taking another step forward, with two new technology announcements: Intel Threat Detection Technology (Intel TDT), a set of silicon-level capabilities that will help the ecosystem detect new classes of threats, and Intel Security Essentials, a framework that standardizes the built-in security features across Intel processors. We are also announcing a strengthened academic partnership with Purdue University, to help accelerate the development and availability of cybersecurity talent.

Intel Threat Detection Technology leverages silicon-level telemetry and functionality to help our industry partners improve the detection of advanced cyberthreats and exploits. Today we are announcing the first two Intel Threat Detection Technology capabilities, including implementation plans by Microsoft and Cisco.

The first new capability is Accelerated Memory Scanning. Current scanning technologies can detect system memory-based cyberattacks, but at the cost of CPU performance. With Accelerated Memory Scanning, the scanning is handled by Intel's integrated graphics processor, enabling more scanning, while reducing the impact on performance and power consumption. Early benchmarking on Intel test systems show CPU utilization dropped from 20 percent to as little as 2 percent.

SPYRUS Delivers 256 GB Microsoft Certified Windows To Go 8.0 and 8.1 Drives

SPYRUS today announced the world's first 256 GB high-capacity versions of their Microsoft certified Portable Workplace, Secure Portable Workplace, WorkSafe, and WorkSafe Pro portable SSD live drives for Windows To Go. The industry's first 256 GB USB form factor SSD drive, manufactured by PNY, addresses a rapidly developing need for trusted mobility solutions that transform almost any laptop or desktop into a trustworthy workspace.

With the launch of this product, SPYRUS's high-capacity live drive provides contractors, remote workers, and telecommuters with a complete operating environment that includes extensive storage capacity for development tools and large datasets that create "personal cloud-like" data analytics.

Christmas Special: The PC Technology of 2011

Welcome to the TechPowerUp 2011 PC technology Christmas special. We hope that you will enjoy reading it while tucking into your turkey, Christmas presents and a little too much wine... In this article, we go through the technology of 2011 that has had the most significance, the most impact and was generally the most talked about. It's not necessarily the best tech of 2011 which is the most significant though, since lemons can be just as significant as the ground-breakers in how they fail to deliver - and the backlash that goes with it.

January: Intel Sandy Bridge i5 & i7

Released on January 9th, the new Intel Core i5 & i7 processors were based on Intel's second generation Core architecture built on a 32 nm production process (HEXUS review). They included an IGP (Integrated Graphics Processor) physically on the same piece of silicon along with HyperThreading. These new dual and quad core processors soundly beat all previous generations of Intel processors in terms of processing performance, heat, power use, features and left AMD in the dust. Therefore, Intel badly needed some competition from AMD and unless you have been living under a rock, you will know how that turned out in October with the launch of Bulldozer. Sandy Bridge was a sound win and is generally considered to be the only architecture worth considering at this point. The i5-2500K is currently at the sweet spot of price/performance. It comes at a stock speed of 3.3 GHz, but typically overclocks to an amazing 4.5 - 5 GHz with a decent air cooler and without too much difficulty in getting there. Models in the budget i3 range were released at various times later. See this Wikipedia article for details.

Password Security The Windows 8 Way

Windows 8 implements a radical new user interface called Metro for desktop PC's, which has so far received a mixed reception. However, there's many other changes under the hood and one of those is how password security is handled, which we look at here. It's a fact of life, that in today's modern world, we have to remember a plethora of passwords and PIN's, which can be daunting. This leads to security issues as users end up writing down passwords and/or create very insecure ones which can be easily guessed. Windows 8 aims to uphold strong password security, while at the same time, easing the burden on the user. Also, passwords can be obtained in various ways by miscreants, such as phishing, keylogging, guessing, and cracking. Windows addresses each of these problems in three main ways:

Windows 8 Secure Boot Feature: Not So Secure?

We have brought you the potential perils of the upcoming UEFI Forum-implemented - www.uefi.org - Windows 8 secure boot feature here, here and here. However, it appears that it may not be so 'secure' after all, since there appears to be a surefire way to circumvent it, at least for the moment, while it's in development.

Softpedia has scored an exclusive interview with security researcher Peter Kleissner, who has created various Windows (XP, Server 2003 etc) "bootkits", which allow OS infection at the highest privilege level, giving unrestricted access to the whole of the PC. His latest one, called Stoned Lite, shows how the Windows 8 secure boot process, still in development, can be subverted, as it stands. He is planning to release details of how the code works at the upcoming International Malware Conference (MalCon) - malcon.org - that will take place in India on November 25th. It appears that the real vulnerability exists in the legacy BIOS boot procedure, not in Microsoft's implementation of secure boot, as Kleissner said:
The problem with the legacy startup is that no one verifies the MBR, which makes it the vulnerable point. With UEFI and secure boot, all the boot applications and drivers have to be signed (otherwise they won't be loaded). You can compare it to TPM, although Arie van der Hoeven from Microsoft announced that the secure boot feature is mandatory for OEMs who want to be UEFI certified. It is a good message that security is not an option.
Return to Keyword Browsing
Apr 25th, 2024 08:06 EDT change timezone

New Forum Posts

Popular Reviews

Controversial News Posts