p25

Latest

  • Gigabyte PC revamps include game-ready Ultrabooks, AMD A4-based tablet (hands-on)

    by 
    Jon Fingas
    Jon Fingas
    06.03.2013

    Gigabyte loves to pull out all the stops at Computex, and this year is no exception: the company just unveiled 11 (mostly) new laptops and tablets. According to a brochure on hand at the computer maker's demo table, the emphasis is chiefly on slimmer portables with both Haswell-era Core processors and some dedicated graphics firepower. The P34G and P35K Ultrablade models are equally 0.83 inches thick, but pack gaming-friendly GeForce GTX 760M (P34G) and 765M (P35K) video. More pedestrian Ultrabooks get a boost as well: both the touchscreen U24T (pictured above) and the non-touch U24F wield a mid-tier GeForce GT 750M. If you don't mind bulkier laptops, the Q2546N, Q2556N, U35F, P27K and P27W scale from the GeForce GT 740M through to the GTX 770M while allowing for more storage and Creative Sound Blaster audio tuning. The tablet updates aren't nearly as extensive. Most of Gigabyte's energy centers on the 10-inch Slate S10A, a spin on the S1082 with an AMD Temash-based A4-1200 processor that delivers up to 14 hours of battery life. Other refreshes are even subtler: the 11.6-inch U21M convertible is similar to the U2142, while the dockable S1185 returns virtually unchanged outside from a new Padbook nickname. Release dates and prices aren't immediately available for any of the new systems, unfortunately, but you can peek at a few of the fresh models in our hands-on photos just below. %Gallery-190058% Zach Honig and Mat Smith contributed to this report.

  • Researchers use children's toy to exploit security hole in feds' radios, eavesdrop on conversations

    by 
    Amar Toor
    Amar Toor
    08.11.2011

    Researchers from the University of Pennsylvania have discovered a potentially major security flaw in the radios used by federal agents, as part of a new study that's sure to raise some eyebrows within the intelligence community. Computer science professor Matt Blaze and his team uncovered the vulnerability after examining a set of handheld and in-car radios used by law enforcement officials in two, undisclosed metropolitan areas. The devices, which operate on a wireless standard known as Project 25 (P25), suffer from a relatively simple design flaw, with indicators and switches that don't always make it clear whether transmissions are encrypted. And, because these missives are sent in segments, a hacker could jam an entire message by blocking just one of its pieces, without expending too much power. What's really shocking, however, is that the researchers were able to jam messages and track the location of agents using only a $30 IM Me texting device, designed for kids (pictured above). After listening in on sensitive conversations from officials at the Department of Justice and the Department of Homeland Security, Barnes and his team have called for a "substantial top-to-bottom redesign" of the P25 system and have notified the agencies in question. The FBI has yet to comment on the study, but you can read the whole thing for yourself, at the link below.