cpu

Wed
19
Aug
John Lister's picture

Chrome to Test Ways in Using Less CPU, Battery

Google is experimenting with a way to make Chrome use less power when a laptop battery is starting to run out. But it will rely on website owners to make it happen. The test is of a "Battery-Savings Meta Tag" which can be added to a website's code ... and will include battery saving recommendations specific to that site. These would then kick in whenever the computer is at a particular battery level. The idea is to avoid having Chrome itself simply take blanket measures that might not be appropriate for all websites. Video Frame Rate Lowered One of the examples Google gives is for a tag to say ... (view more)

Fri
22
May
John Lister's picture

Chrome to Automatically Block Power-Hungry Ads

Chrome is to start automatically blocking online ads that make particularly high use of computer resources. It will be a small change that Google hopes will have a big effect. This will be the second set of changes Chrome has made to the way it ... handles ads following alterations over the past couple of years to block "abusive" and "deceptive" ads. These include ads which have misleading buttons such as a "play" button that actually downloads a file or a "close window" button that actually opens new pop-up windows. The new change will involve Chrome having an limit on how much resources such as ... (view more)

Wed
20
Mar
John Lister's picture

Report: Microsoft Bugs 'Most Exploited' by Hackers

According to a recent report, Microsoft products made up eight of the ten most exploited software bugs last year according to a security company. That's higher than in recent years, largely because Adobe Flash is becoming a less rewarding target for ... hackers as it loses popularity. As recently as 2015, most of the top ten involved bugs with Flash. Microsoft took the unwanted lead in 2017 with seven entries on the list. (Source: bleepingcomputer.com ) Internet Explorer Tops The List The top spot for 2018 went to a bug in the Windows VBScript engine . That's a tool that handles code designed for ... (view more)

Tue
12
Feb
John Lister's picture

New Google On-the-fly Encryption Ultra Fast, Secure

Google has developed a new type of encryption that could run on any Android device. It means added security even for the most basic phones, smart watches and smart TVs. The encryption in question isn't for transmitting data, but rather for data ... stored on a device. The data is controlled by unlock methods such as passwords, pin codes and fingerprints. The idea is that if somebody gets hold of a device and doesn't have the correct login credentials, they can't simply extract files from the device and access personal data. At the moment Android devices with encryption use Advanced Encryption ... (view more)

Tue
06
Nov
John Lister's picture

CPU Hyper-threading Reverse Engineered to Spy on Processes

One of the most useful features in computer hardware has a security flaw. It's to do with the way processors handle information. All computing tasks are reduced down to a set of calculations. The central processing unit (CPU) is the "brain" of the ... computer that physically carries out these calculations. Each modern-day CPU has one or more cores , which is essentially multiple "brains" on a single CPU chip. A multi-core CPU means that multiple calculations can be done at once, which reduces the time to carry out a task. Many processors also use a technique called ... (view more)

Wed
18
Jul
John Lister's picture

Chrome to become Slower, Use More Memory to Tackle Malware

Google is updating the Chrome browser to give it better defenses against major security threats. It comes at the price of reduced performance and a larger memory footprint. The changes are to address two security bugs labeled Meltdown and Spectre by ... researchers. They take advantage of a flaw in almost every computer processor built since 1995, which is (as of this day) 100% of all computers, tablets, smartphones, laptops - and anything else that uses a processor. The flaw is in regard to a processor feature, which is designed to speed up a computer's response time. It works by using spare ... (view more)

Thu
11
Jan
John Lister's picture

Intel and IBM Demo Quantum Computer at CES 2018

Intel and IBM are battling to show off some of the most advanced 'quantum computers' ever made. It's a big step towards incredibly powerful computers that could even replicate the workings of a human brain. A quantum computer takes advantage of one ... of the most curious aspects of physics: that tiny particles can exist in two different states at the same time. This essentially allows a complete rewrite of the mathematics behind computing. Ordinary computers work by turning data into binary code: a string of 0s and 1s. In traditional computers, that involves a series of electronic 'gates' that ... (view more)

Mon
08
Jan
Dennis Faas's picture

Can Malware (Spectre, Meltdown) Spy After Reboot?

In regard to last week's article on the Spectre and Meltdown CPU exploits, which affects 100% of all computers made since 1995, user 'rep' had the following question to ask: " Dear Dennis, [Being that this is a hardware exploit], am I right in ... thinking that any passwords, etc, which are stored in the CPU's memory are lost when the computer is shut down? If so, could I simply shut off the computer and reload it every time I want to use Internet banking and would that keep me safe from these exploits? " My response: I posted my original response in the comments section of Friday's article, but ... (view more)

Fri
05
Jan
Dennis Faas's picture

Spectre and Meltdown Exploits - What You Need to Know

Infopackets Reader Steve P. writes: " Dear Dennis, There has been a whirlwind of news on the Internet regarding the 'Spectre' and 'Meltdown' exploits that affect all microprocessors (CPUs) from 1995 and on. I am afraid my computer is at risk but I ... don't understand all the tecno-talk. Should I be worried? " My response: The short answer is: yes and no, mostly no (once patches are released). At the end of this article I'll offer advice on what you can do to stay protected. What does the Spectre and Meltdown Exploit Mean? I have been following the news for the last few days and here is what I ... (view more)

Fri
08
Sep
Dennis Faas's picture

How to Fix: Malwarebytes MBAMService.exe High CPU Usage

Infopackets Reader Ramona A. writes: " Dear Dennis, Recently My Windows 7 laptop kept popping up with ' Windows has detected that your computer's performance is slow ' error messages. I disabled the color scheme to fix the issue (as recommended) but ... the popups kept coming every 3 minutes or so. I suspected I was infected with malware, so I downloaded Malwarebytes Antimalware and did a scan. MBAM found over 1,700 'threats' - one of them was a rootkit. I quarantined all the items, then rebooted and things are much better, however - now the 'mbamservice.exe' is constantly causing high CPU load ... (view more)

Pages

Subscribe to RSS - cpu