Rabu, 15 Mei 2019

Pixel 3a and OnePlus 7 are both cheap new Android phones, but one is way better than the other - BGR

Google unveiled the Pixel 3a series last week during it’s opening I/O 2019 keynote, a phone that had been fully detailed in rumors in leaks for months. Exactly a week later, OnePlus hosted its own press conference to launch the phones all knew were coming from the company, the OnePlus 7 series. They’re all great phones but if you’re buying a brand new Android phone on a budget, there’s really only one you should buy and there’s no contest between them.

Google is selling the Pixel 3a with the help of a camera that’s supposed to deliver almost the same features as the flagship version, the Pixel 3. Add to that the fact that the Pixel 3a will be among the first phones to run the latest versions of Android as well as the affordable price tag, and you end up with the only reasons why you should look at this mid-range phone.

On the other hand, the OnePlus 7 packs the same Snapdragon 855 processor that powers Samsung’s Galaxy S10 phones, as well as many other Android flagships. The Pixel 4 will likely also get a Snapdragon 855 chip. The OnePlus phone packs more RAM than the Pixel 3a, and rocks faster UFS 3.0 flash storage — the OnePlus 7 is the only Android handset right now with UFS 3.0.

You also get much faster battery charging speeds and better build quality. That means the all-screen display design and the fingerprint sensor that’s built right into the screen of the OnePlus 7. Yes, it’s the same design as the OnePlus 6T, but it’s still much better than what the Pixel 3a has to offer.

Some will say that the Pixel 3a might still deliver better camera performance overall, but OnePlus has also made improvements to its own camera experience. And let’s not forget that you don’t use the phone solely for taking low-light photos, a point I made when I told you how silly it is to trade the Pixel 3a for any iPhone newer than the iPhone 6. And the OnePlus 7 will be one of the fastest phones around when it’s released on Friday. The Pixel 3a? Not so much, especially considering that the more powerful Pixel 3 has received plenty of criticism when it comes to overall performance.

As for the software, let’s remember that OnePlus is among the companies that support fast Android betas and updates, which means the OnePlus 7 phones should get Android Q sooner than most rival handsets.

The OnePlus 7 with 6GB of RAM and 128GB is £499 in the UK, and I’m using UK prices simply because the OnePlus 7 isn’t available in the USA right now. The Pixel 3a (4GB/64GB) costs £399 in the region.

Some will say that it’s not fair to compare mid-range phones to flagships, and that’s true — but of course, that’s what Google does. I’m simply pointing out the fact that OnePlus’s cheapest new phone is an incredible deal. Considering the narrow price difference between these two devices, there’s really no reason to buy the Pixel 3a.

If you’re willing to spend even more money, then just forget about the Pixel 3a and OnePlus 7, and go for the OnePlus 7 Pro, which has a ton of new features on top of what the regular OnePlus 7 has to offer. The cheapest Pro costs $669 in the US, or $270 more than the Pixel 3a.

Let's block ads! (Why?)


https://bgr.com/2019/05/15/oneplus-7-vs-pixel-3a-why-googles-phone-isnt-worth-buying/

2019-05-15 14:12:00Z
52780295609869

ZombieLoad Attack Affects All Intel CPUs Since 2011: What to Do Now - Tom's Guide

[unable to retrieve full-text content]

  1. ZombieLoad Attack Affects All Intel CPUs Since 2011: What to Do Now  Tom's Guide
  2. New secret-spilling flaw affects almost every Intel chip since 2011  TechCrunch
  3. What To Do About the Nasty New Intel Chip Flaw  Gizmodo
  4. Linux vs. Zombieload  ZDNet
  5. Zombieload, the latest Intel Speculative Execution vulnerability, has been patched today  MSPoweruser
  6. View full coverage on Google News

https://www.tomsguide.com/us/zombieload-attack-intel-what-to-do,news-30082.html

2019-05-15 13:41:15Z
52780296496714

ZombieLoad Attack Affects All Intel CPUs Since 2011: What to Do Now - Tom's Guide

[unable to retrieve full-text content]

  1. ZombieLoad Attack Affects All Intel CPUs Since 2011: What to Do Now  Tom's Guide
  2. New secret-spilling flaw affects almost every Intel chip since 2011  TechCrunch
  3. What To Do About the Nasty New Intel Chip Flaw  Gizmodo
  4. Linux vs. Zombieload  ZDNet
  5. Intel Flaw Lets Hackers Siphon Secrets from Millions of PCs  WIRED
  6. View full coverage on Google News

https://www.tomsguide.com/us/zombieload-attack-intel-what-to-do,news-30082.html

2019-05-15 12:31:09Z
52780296496714

Install updates now to address a vulnerability in most Intel CPUs - Engadget

Sponsored Links

ullstein bild Dtl. via Getty Images

In January 2018, a pair of security exploits dubbed Spectre and Meltdown showed how attackers could take advantage of commonly-implemented CPU technology to access data they shouldn't have been able to. They were followed by a similar bug, Foreshadow, late last year, and now researchers have uncovered four different techniques that exploit Intel's speculative execution technology in a similar way.

The website CPU.fail has collected information about each vulnerability -- they're collectively referred to as Microarchitectural Data Sampling (MDS) -- including Zombieload, RIDL & Fallout, and Store-to-Leak Forwarding. Example code shows how the attacks could be launched using malicious JavaScript, for example, and researchers state that it would be difficult for antivirus software to detect it, however they have not found evidence of anyone using the tech in attacks so far.

If you have a computer using an Intel CPU released since 2011 then congratulations -- you've likely won a vulnerability, since only "select" 8th and 9th gen Core CPUs as well as 2nd generation Xeon Scalable CPUs have hardware protection against the attacks.

Patching the holes will require a combination of firmware updates and software updates. macOS, Windows, ChromeOS and Linux already have software updates to address MDS attacks, while Intel has also released microcode updates for some of its hardware (PDF) that you should get through motherboard and system vendors. Just like Spectre and Meltdown, the fixes are expected to impact performance -- you can get more information on how much right here.

Let's block ads! (Why?)


https://www.engadget.com/2019/05/15/intel-mds-exploit/

2019-05-15 07:30:45Z
52780296496714

Install updates now to address a vulnerability in most Intel CPUs - Engadget

Sponsored Links

ullstein bild Dtl. via Getty Images

In January 2018, a pair of security exploits dubbed Spectre and Meltdown showed how attackers could take advantage of commonly-implemented CPU technology to access data they shouldn't have been able to. They were followed by a similar bug, Foreshadow, late last year, and now researchers have uncovered four different techniques that exploit Intel's speculative execution technology in a similar way.

The website CPU.fail has collected information about each vulnerability -- they're collectively referred to as Microarchitectural Data Sampling (MDS) -- including Zombieload, RIDL & Fallout, and Store-to-Leak Forwarding. Example code shows how the attacks could be launched using malicious JavaScript, for example, and researchers state that it would be difficult for antivirus software to detect it, however they have not found evidence of anyone using the tech in attacks so far.

If you have a computer using an Intel CPU released since 2011 then congratulations -- you've likely won a vulnerability, since only "select" 8th and 9th gen Core CPUs as well as 2nd generation Xeon Scalable CPUs have hardware protection against the attacks.

Patching the holes will require a combination of firmware updates and software updates. macOS, Windows, ChromeOS and Linux already have software updates to address MDS attacks, while Intel has also released microcode updates for some of its hardware (PDF) that you should get through motherboard and system vendors. Just like Spectre and Meltdown, the fixes are expected to impact performance -- you can get more information on how much right here.

Let's block ads! (Why?)


https://www.engadget.com/2019/05/15/intel-mds-exploit/

2019-05-15 07:30:20Z
52780296496714

Install updates now to address a vulnerability in most Intel CPUs - Engadget

Sponsored Links

ullstein bild Dtl. via Getty Images

In January 2018, a pair of security exploits dubbed Spectre and Meltdown showed how attackers could take advantage of commonly-implemented CPU technology to access data they shouldn't have been able to. They were followed by a similar bug, Foreshadow, late last year, and now researchers have uncovered four different techniques that exploit Intel's speculative execution technology in a similar way.

The website CPU.fail has collected information about each vulnerability -- they're collectively referred to as Microarchitectural Data Sampling (MDS) -- including Zombieload, RIDL & Fallout, and Store-to-Leak Forwarding. Example code shows how the attacks could be launched using malicious JavaScript, for example, and researchers state that it would be difficult for antivirus software to detect it, however they have not found evidence of anyone using the tech in attacks so far.

If you have a computer using an Intel CPU released since 2011 then congratulations -- you've likely won a vulnerability, since only "select" 8th and 9th gen Core CPUs as well as 2nd generation Xeon Scalable CPUs have hardware protection against the attacks.

Patching the holes will require a combination of firmware updates and software updates. macOS, Windows, ChromeOS and Linux already have software updates to address MDS attacks, while Intel has also released microcode updates for some of its hardware (PDF) that you should get through motherboard and system vendors. Just like Spectre and Meltdown, the fixes are expected to impact performance -- you can get more information on how much right here.

Let's block ads! (Why?)


https://www.engadget.com/2019/05/15/intel-mds-exploit/

2019-05-15 06:40:34Z
52780296496714

Install updates now to address a vulnerability in most Intel CPUs - Engadget

Sponsored Links

ullstein bild Dtl. via Getty Images

In January 2018, a pair of security exploits dubbed Spectre and Meltdown showed how attackers could take advantage of commonly-implemented CPU technology to access data they shouldn't have been able to. They were followed by a similar bug, Foreshadow, late last year, and now researchers have uncovered four different techniques that exploit Intel's speculative execution technology in a similar way.

The website CPU.fail has collected information about each vulnerability -- they're collectively referred to as Microarchitectural Data Sampling (MDS) -- including Zombieload, RIDL & Fallout, and Store-to-Leak Forwarding. Example code shows how the attacks could be launched using malicious JavaScript, for example, and researchers state that it would be difficult for antivirus software to detect it, however they have not found evidence of anyone using the tech in attacks so far.

If you have a computer using an Intel CPU released since 2011 then congratulations -- you've likely won a vulnerability, since only "select" 8th and 9th gen Core CPUs as well as 2nd generation Xeon Scalable CPUs have hardware protection against the attacks.

Patching the holes will require a combination of firmware updates and software updates. macOS, Windows, ChromeOS and Linux already have software updates to address MDS attacks, while Intel has also released microcode updates for some of its hardware (PDF) that you should get through motherboard and system vendors. Just like Spectre and Meltdown, the fixes are expected to impact performance -- you can get more information on how much right here.

Let's block ads! (Why?)


https://www.engadget.com/2019/05/15/intel-mds-exploit/

2019-05-15 06:40:30Z
CAIiEIG4xab8uejlVrQ1bGzo2tkqGAgEKg8IACoHCAowwOjjAjDp3xswicOyAw