First AMD Zen Benchmarks Were an April Fools Prank

UPDATE: We have now been informed from a kind reader that this was an April Fools joke, so please disregard the benchmark images below

AMD has been lingering behind in the enthusiast CPU market and really struggled to compete with Intel’s flagship products. This isn’t a shocking revelation when you consider AMD is still using the FM2+ socket to house its current processor line-up. Thankfully, Zen is upon us and the first major socket change in a considerable amount of time. We’re all hoping that AMD can become competitive again and Zen really helps bring innovation forward in the stagnant CPU market. AMD’s President and CEO, Lisa Su provided a small insight into Zen’s performance numbers and suggested they will bring a 40 percent IPC boost over the current line-up. Up to this point, all performance benchmarks have been kept under wraps and any numbers revolved around pure speculation.

However, images provided by Bits&Chips clearly illustrate the performance differences between a Octacore AMD Zen CPU and competing products. The CPU’s FP32 Ray-Trace score outperforms the i7-4930K but it’s not as impressive as the CPU hash results. This means the architecture might implement a weaker FMA.

On a more positive note, DDR4 bandwidth performance is impressive and competes with the i7-6700K. The CPU Hash is significantly better than the i7-5820K and even surpasses a 20-core Xeon. Only time will tell if AMD’s latest processors can offer similar performance to Intel products and instigate a pricing war. Currently, the i7-6700K is extremely expensive for a 4-core CPU and there needs to be some competition to drive innovation. I cannot wait to get my hands on AMD’s AM4 motherboards and finally see if they’ve come up with the goods. The basic data we have so far and information from AMD is promising but it’s always unclear until the testing has been completed from independent sources.

Do you think AMD will be able to have a much stronger foothold in the CPU market once Zen releases?

FBI Employees Details Published by Hacker

The Federal Bureau of Investigation (FBI) are known for being involved in all kinds of work, from exposing corrupt judges to fighting malware. They have also been known to take part in some hacking, from using ethically questionable equipment to zero-day exploits. Imagine the irony then when hackers threatened to release information about twenty thousand FBI employees, only to then carry out that threat and expose the FBI employees details online.

The hackers, who posted from the twitter account @DotGovs, claimed that by hacking the Department of Justice’s (DOJ) database, they were able to obtain the information. This information was released only a day after posting similar information on 10,000 Department of Homeland Security employees.

Listing their names, phone numbers and emails addresses the information, if revealed to be true, could be dangerous to both the government and the employees listed in the data breaches. Peter Carr, speaking on behalf of the Department, told CNN the following.

“The department is looking into the unauthorized access of a system operated by one of its components containing employee contact information. “This unauthorized access is still under investigation; however, there is no indication at this time that there is any breach of sensitive personally identifiable information. The department takes this very seriously and is continuing to deploy protection and defensive measures to safeguard information. Any activity that is determined to be criminal in nature will be referred to law enforcement for investigation.”

Stating that there was no “sensitive personally identifiable information” is one thing but if it reveals names, numbers and emails, that’s personal enough for me. The hackers tweeted saying “When will the US government realize we won’t stop until they cut relations with Israel”. This following on from their initial boast of “FBI and DHS info is dropped and that’s all we came to do, so now its time to go, bye folks! #FreePalestine.”.

If this information is found to be genuine it represents a clear breach of the DOJ’s systems and the employees of several major governmental organisations.

Gran Turismo Sport Concept Art Leaked

Gran Turismo revolutionized the racing genre on consoles due to the enticing career mode, superb car selection and advanced physics model. Sadly, in recent years, the series has floundered and struggled to compete with Forza’s yearly release cycle. Additionally, Gran Turismo 5 was a major disappointment and I didn’t really find Gran Turismo 6 enjoyable either. Strangely enough, Gran Turismo 6 doesn’t pose any challenge in terms of the license events, or competition from the AI. In an ideal world, Polyphony Digital should have released Gran Turismo 7 as a PlayStation 4 launch title, but this didn’t happen and their projects usually take a long time to complete.

Thankfully, Gran Turismo Sport was announced some time ago during the Paris Games Week although we don’t know what this will actually entail. Apparently, it’s not a small demo of Gran Turismo 7 like earlier concept titles and should provide a fulfilling experience. According to Website GTPlanet, the Gran Turismo offices contained concept art on the wall during the Christmas period of the upcoming game! Super GT drivers Kohei Hirate and Satoshi Motoyama, and Toyota’s Masashi Honda publicly unveiled the images which are listed below:

There is still some speculation regarding the authenticity of some of the images, as they look photo-realistic. I’m pretty sceptical about the snapshot with trees in the background but perhaps the studio has found a way to implement satellite images into the render. However, this is very unlikely and wishful thinking. Whatever the case, I cannot wait to see Gran Turismo Sport and hope it provides the stopgap needed to please racing fans before the release of Gran Turismo 7.

Wetherspoons Reveals Extent Of Hack

From phone calls made to and from prisons, to the details of thousands of children and their parents, hacks seem to be everywhere and are affecting everyone these days. The latest one to reveal they’ve been hacked is  JD Wetherspoons, the popular pub chain.

Revealing that its old website was hacked between the 15th and 17th of June, but only learning about the attack on the 1st of December, Wetherspoons called in security specialists before informing customers on the 3rd of December. Yet again the hack seems to have revealed a database containing numerous customer details, currently put at around 656,723 customers.

The details included in the database were the first name, surname, date of birth and contact details such as mobile phone numbers and email addresses.

If you purchased a voucher before August 2014, the last four digits of your credit or debit card could have been accessed, although they are keen to express that no other details, such as security codes or the remainder of your card details, were exposed.

Don’t pay by card? How about not using your card when you go to Wetherspoons? This doesn’t affect me? Did you sign up for their free wifi, or maybe even used the Contact us form? If you did then your data could be included in that which was revealed.

Amongst TalkTalk, Vodafone and VTech, more and more companies are finding their systems breached. Maybe now is a good time to avoid handing out any details to any company or person.

First In-Game Screenshots of Retail Fallout 4 Leak Online

Fallout 4 is almost here and that means that leaks are starting to slip through the net. The first in-game screenshots from the PlayStation 4 retail (final) version of the game have been leaked online, showing us a bit of what we can expect from the latest Bethesda epic. I must admit, the images look a little lackluster, insert console version joke right here, but they really do look a little lacking in the texture department.

The game looks pretty much like what you would expect from a Fallout game, but the real merit will no doubt be in the story and the gameplay, as is often the way with Bethesda games.

I can’t wait to see how the visuals of the PC version compare, especially one the extremely talented modding community gets their paws on it and retextures and models a large part of the game, as we’ve seen with previous entries in the series.

Let’s just hope the game doesn’t launch in an unplayable buggy state, as so many other games do these days.

Are you looking forward to playing Fallout 4?

Leaked Slide Suggests AMD and NVIDIA Will Both Use GDDR5X

We have previously reported the rumours that Nvidia was planning to use GDDR5X on their upcoming Pascal graphics cards, a rumour that not everyone bought right away. But there are quite a few reasons that we could see this happen and the newest leak seems to support this.

Last time it was a German site that leaked the GDDR5X information and this time we get news from a Russian outlet that got their hands on what looks like leaked slides from Micron of the upcoming GDDR5x memory. The site also suggests that this won’t be limited to only Nvidia, but that AMD also will want to get on board and use this type of memory on some of their graphics cards next year.

HBM, and HBM2 might be very exciting and be the next mainstream graphics memory, but it is still a costly one to produce and the production is also limited. This leaves room for the next GDDR5 standard to make its entry. GDDR5X offers double the data-rate per memory access of 64 byte/access compared to 32 byte/access of the current GDDR5 standard. Where current GDDR5 tops out at around 7Gbps, the new standard will initially offer 10-12 Gbps with a later goal to achieve 16 Gbps.

The implementation of the new memory should be relatively easy and cheap for manufacturers as the new chips will retain the same pin layout. With all this information, we can assume that HBM will be reserved for the top-tier graphics cards for the foreseeable future while GDDR5x will breath more power into mid-level and entry-level cards and allow them to perform better at the ever-increasing resolutions.

Weaponslist From Upcoming DOOM Closed-Alpha Leaked

DOOM is one of those games that started the modern gaming era for real and the newest addition to the game series is about to hit the closed alpha phase where previous players of Wolfenstein: The new Order can register for access to play. Now a few screenshots of the upcoming Alpha have hit the internet thanks to DSOG, but they sadly don’t show any in-game footage.

We’ve previously been teased with the new game, first with a 3-second trailer during E3 and later on a little early in-game video. This time we get a look at the weapons list, what will be available and what functions they have. The weapons look relative normal for DOOM from a function point of view and fans will be glad that the super shotgun is back, but fans have already called them both boring and lifeless.

We have to keep in mind that this is pre-early-alpha screenshots, so we can expect a lot to change, especially cosmetic, before the game ultimately launches. The closed alpha version of Doom will provide one multiplayer map, Heatwave, that should suit most play styles and allow players to get a feel for the game. The one available mode will be 6vs6 deathmatch in this early version, something that doesn’t remind me a lot of DOOM at all. I’d rather seen a normal deathmatch mode where everyone is against everyone.

The Intercept Leaks Huge Cache of Documents on the USA Drone Strike Program

Leaks of classified information have been part of the fabric of social interactions and also modern-day communications that includes the Internet, from hacked celeb pics to the now infamous Edward Snowdon cache of documents that detailed the extensive surveillance states and operations around the world. This leak is no different, yet if genuine, (I have to put this caveat in just in case someone is lying here and it comes back to bite me firmly on the posterior), is a huge trove of secret documents which have been published by The Intercept, detailing the Obama administration’s secretive and controversial drone-based assassination program.

If you’re not familiar with this program then let me elaborate, The US military and figures including the Obama administration have implemented a program that sort to track and kill high-value enemy targets throughout Afghanistan, Yemen, and Somalia. Now onto the documents which have been classed as being leaked by an anonymous whistleblower, this information covers an extensive array of subjects which includes kill chains, operations and also the standard intelligence flaws.

Skimming through this information reveals some extremely sensitive documents, for example “One top-secret document shows how the terror watchlist appears in the terminals of personnel conducting drone operations, linking unique codes associated with cellphone SIM cards and handsets to specific individuals in order to geolocate them”.

Another document reveals a case of a British citizen, Bilal el-Berjawi, who was stripped of his citizenship before being killed in a U.S drone strike in 2012. “British and American intelligence had Berjawi under surveillance for several years as he travelled back and forth between the U.K. and East Africa yet did not capture him. Instead, the U.S. hunted him down” and eventually used a drone strike to kill him in Somalia.

The “Kill Chain” sounds like a title to a film, yet this purported leak is very compelling, interesting, informative and also fascinating. It details the steps required to authorize a drone strike on a target in Yemen and the people who it passes through. It also shows that according to a Pentagon study, president Obama signed off on a 60 day authorizations to kill suspected terrorists, but he did not sign off on individual strikes.

According to the documents, there are two steps. Step 1 is choosing the target and step 2 is taking a strike. Step 1 starts from a JSOC task force before going through officials including Leon Panetta who is the Secretary of Defence, a principals committee which includes Hillary Clinton all the way to President Obama. Step 2, in the case of strikes in Yemen, ranges from a JSOC task force all the way to the president of Yemen.

Well yes, this is indeed big, am I surprised? No, the US is addicted to the Find Fix Finish mantra which has made drone strikes popular for the administration. The cache is extensive and it is far too much information to detail here, otherwise this article would be 5000 words long, and few want that.

It will be fascinating to see further developments in the coming days, weeks and also months.

Thank you theintercept for providing us with this information.

Millions of T-Mobile Customer Records Stolen In Data Hack

If I had a £1/$1 every time a company was hacked and private details of consumers were leaked to a third-party, I would be now looking at a brochure for mansions. The latest victim is mobile communications company T-Mobile, who have fallen victim to a data breach.

An estimated 15 million T-Mobile customer records have been stolen after hackers attacked Experian, who are the company responsible for processing credit applications from consumers for the mobile company. Below are the details that Experian believe have been stolen from consumers in the hack, this includes  “access to a server that contained personal information for consumers who applied for T-Mobile USA postpaid services between Sept. 1, 2013 and Sept. 16, 2015.

  • Name
  • Address
  • Social Security Number
  • Date Of Birth
  • Drivers licence
  • Passport Number
  • Military ID Number
  • Any Other T-Mobile Credit assessment details

According to Experian, there were no “Payment Card or Banking Information” obtained during the discovery of the breach on the 15th September 2015. Over at T-Mobile, CEO John Legere stated that he was “incredibly angry about this data breach and T – Mobile will institute a thorough review of our relationship with Experian, but right now my top concern and first focus is assisting any and all consumers affected. I take our customer and prospective customer privacy VERY seriously”.

In these situations a consumer can feel powerless, no matter how careful they are at their end, they may still find personal and very sensitive details leaked to a third-party. Companies need to fully prioritize and secure customers data, otherwise there will be many more instances of this nature which will be just around the corner. If Hollywood ever attempted to produce a film concerning the many breaches, it would have a plot akin to Groundhog day.

Thank you experian and t-mobile and nextweb for providing us with this information.

Original Image courtesy of droid

Anonymous Attacks The Canadian Government and Leaks Classified Data

In the real world, the establishment counteracts instances of criminality by an extensive array of resources and a structured organisation. In cyberspace, groups such as Anonymous are organised, well versed in operational hacking activities and are able to use tools which are inexpensive, perhaps this is why governments and companies have yet to get a grip on data which has metaphorically walked out the door, hitched a plane and ended up on someone else’s computer.

The fore mentioned Anonymous have looked to be using techniques to again prise open the gates to documents, as reports have begun to circulate over the leaking of yet another high-level federal document concerning the redevelopment of Canada’s key diplomatic centres in Britain. This alleged leak is the second in a campaign against the Canadian government with the information purporting to include budgetary deficits and the “selling, relocating and refurbishing of Canada’s diplomatic buildings in London”

The documents belong to the Treasury Board of Canada and are dated 6th February 2014, or if this is as many are believing to be authentic, a now very irritated Treasury Board of Canada. These leaks are an attempt by the Cyber infiltration group “to pressure the government over the fatal shooting of a protester in B.C. and the passing of Bill C-51, the controversial anti-terrorism bill that gave expanded powers to police and Canada’s spy agency”.

Meanwhile, sources say that federal authorities are comparing versions of the documents and scanning for discrepancies that may help track down from whose hands it may have slipped.

Have I any sympathy for the Canadian government? Well, you know me don’t you; it demonstrates poor Cyber awareness and a lack of safe practise in the storage of classified documents, remember, the infrastructure has not been breached by a country attacking another state but by a hacktivist group.

Governments are losing the argument when it comes to attacking the criminality of these acts, after all, the actions by this group are against the law, but for me, so are the increased surveillance capabilities of agencies and the implementation and recruitment of external hacking teams, as in the case of, well Hacking Team to be precise.

“Freedom is never more than one generation away from extinction. We didn’t pass it to our children in the bloodstream. It must be fought for, protected, and handed on for them to do the same”. Ronald Regan

Thank you nationalpost for providing us with this information.

Image courtesy of occupycorporatism

WHSmith Contact Us Sends Email To Companies Mailing List

Online shopping is a big thing, and companies like to keep track of what you’re buying and even send you the odd offer here or there, you brought a TV so why not buy a sound system for 20% less? Normally these offers mean we sign up with some sort of password and email combination, and you expect them to store these and be safe. In recent years we’ve seen some sites hacked and their details published online, but today it would seem that WHSmiths has taken it a step further with their contact us form emailing everyone who had registered for magazines with the company!

In a statement, WHSmiths stated that “I-subscribe [the company responsible for their magazine subscriptions] have immediately taken down their ‘Contact Us’ online form which contains the identified bug, while this is resolved”. They stressed in their discussion with the Guardian newspaper that it was “a bug not a data breach”.

The emailed not only included the information such as the person’s name and the message they wished to send but was sent to a large list of contacts, thus exposing their details to a wider than wanted audience.  Some of the earlier messages contained not only their real names and emails but also postal addresses and phone numbers.

With data security at its highest and customers, both paying, and interested parties, worried about the extensive breaches and accidents, will companies soon look at different ways of storing information where these accidents could happen less?

Thank you The Guardian for the information.

Image courtesy of Corporate Marks and Spencers

Epic Games Forums Taken Down After Hack

There is no shortage of victims in hacking cases these days, it seems like it’s the hobby of the generation or something. The latest victim is Epic Games who had their forums hacked and as a consequence they have temporarily taken the forums down and disabled them until the situation has been dealt with.

A round of mass emails went out this morning informing signed up users about the security breach and effects there off. It is still unclear how much information the hacker made off with, but the hack might have resulted in access to your usernames, passwords, email addresses, and date of birth that you provided when you signed up.

“We have just discovered that the Epic Games forums located at forums.epicgames.com were compromised by a hacker. We are sorry to report that the incident may have resulted in unauthorized access to your username, email address, password, and the date of birth you provided at registration.”

Epic Games is strongly suggesting that you change your password on any other site that might use the same combination as on Epic Games forums. One should never use the same password and user combination more than one place, but we also all know that a lot of people do it for convenience.

The affected forum site covers UDK, Infinity Blade, Gears of War, Bulletstorm, and prior Unreal Tournament games. However, the separate forum sites covering Unreal Engine 4, Fortnite, and the new Unreal Tournament were unaffected.

Star Wars Battlefront Alpha Torrent Leaked

There is still some waiting time until Star Wars: Battlefront officially launches, but it has already made it to Alpha stage. We’ve gotten more and more details over time and it looks like the game actually could live up to the hype that surrounds it.

Just hours after the Alpha launched for a limited number of people, it made its way to torrent sites. That was very quick after launch and some people are speculating if this could be an elaborate marketing strategy. It wouldn’t be the first time that the ‘illegal’ users have been used this way; tell people they aren’t allowed to participate and it is all they want.

Whether this is an actual unintended leak or a clever campaign from EA and Dice to raise the hype around the game even more, we don’t know and we probably never will. What we do know is that what we have been shown so far looks amazing and that the Alpha version is out in the wild.

Maybe you’re one of the lucky ones to get into the official Alpha selection, if so, then let us know what you think of it so far.

Thank You TweakTown for providing us with this information

Radeon R9 Fury X Reviewers Guide Leaked

PC gaming is constantly evolving, components become more durable, powerful and innovative. The end result being gamers getting a much better experience from their games.

This week there has been some serious hype about the all new Radeon R9 Fury X GPU, the highest end card to feature the new Fiji GPU chip. Earlier this week a Reviewers guide was leaked by videocardz.com.

They posted an article on their website with the above picture, providing the technical specs of the new card. We can see that it has 4GB of high bandwidth memory, has a TDP of 275w and is able to support the latest API’s. DirectX 12, Vulkan and Mantle. The article states that the card will (unsurprisingly) be able to provide 4K output. The HBM memory is quite cool too, it can provide more processing power in 19x less space than standard GDDR5 memory that is used in most cards to date. The power efficiency is 35GB/s per watt of power, pretty high compared to GDDR5’s 10.6GB/s per watt. 

AMD have kept this card very sleek and tidy, no large heatsinks hanging out the back, all the PCB is concealed under the black shroud. The guide states that AMD have kept with the following design criteria. Professional. Elegant. Simple. Modern.  and we can see that they have! It’s a beautiful card to look at and it looks even better in a chassis.

They also stated:

“In addition the AMD Radeon R9 Fury X features our brand new GPU Tach LEDs, which are 8+1 LEDs located above the PCIe power connectors that indicate the intensity level of the GPU operation. For example during a typical gaming session all 8 LEDs will be lit, and while typically idling on the desktop a single LED will be lit. These 8 LEDs are user configurable to either red and/or blue by the physical dipswitch located on the back side of the graphics card. The 1 green LED located alongside the 8 LEDs indicates when the graphics card is in ZeroCore Power operation.”

Sounds pretty sweet, right? I can see this being a really nice feature to have on cases with large window panels, so you can see how hard your GPU is being hammered without having to have a pesky 3rd part bit of software running in the foreground.

The people who wrote the article kindly posted some overclocking specs too, they added a 100mhz overclock on the gpu core, providing a handsome 5% increase in performance in Witcher 3.

The card also has AMD’s PowerTune technology inside it, which gives you the ability to tweak your overclock even more, it also comes with the ability to tune your card acoustically, so you can ramp the fan right down to have the quietest experience but the highest temps. Or vice-versa.  One feature that I quite like is the rame rate maximum settings. This enables you to cap the frame rate to reduce screen tear or help to get better performance if only running at say 60fps.

The final, and in my opinion, one of the best parts is the Virtual Super Resolution capability. It gives games the ability to render at the infamous 4k then scale it back down to a normal resolution that is native in the display. The article provides a lot more detail on this feature.

Safe to say, I am pretty excited about the release of the new card – Will I be getting one? quite possibly.

Will you be buying one of these beasts when they’re made available to the public? let us know in the comments

Thank you to Videocardz for providing us with this information.

New Leaked Images Reveal Fury X Power Connectors & More!

As the launch of the next-generation of AMD graphics cards approaches, more cheeky leaks are finding their way online. The latest leaks have shown up as an unboxing on YouTube, even one that appeared on eBay, hardware benchmarks and more! The latest leaked images look pretty legit to me, showing off the design of the AMD Radeon Fury X graphics card, its water cooling unit and more interestingly, the power connectors.

As you can see in the images below, the Fury X is going to be power-hungry, requiring a pair of 8-pin power connectors to feed the card and no doubt the reason why it will use that thick water cooling radiator to keep the heat in check. It’s no secret that Nvidia have got the lead for power efficiency but what we’re really interested in seeing is how the new generation of cards use that power to render graphics; I’ll take FPS over efficiency any day.

Also on show, the water cooling pipes for the radiator, They’re heavily braided to help ensure a long lifespan and reduce any chance of damaging them, or coolant leaks. A shorter graphics card this may be, but those power connectors and that big radiator hint at some pretty hardcore hardware on the interior.

Thank you PCper for providing us with this information.

Supergirl Pilot Episode Leaks Six Month Before Scheduled Air Time

It isn’t long ago that Game of Thrones had four episodes leak onto torrent sites ahead of the official air time and now it has hit another series. The first episode of CBS’s upcoming Supergirl series has appeared on torrent sites six month ahead of its scheduled air time.

It isn’t even a low-quality version camera version or something like that, but the full-HD version and without watermark. The fact that it comes without watermark suggests another source than early screeners as it was the case for the Game of Thrones leak.

With the way this has pilot has appeared, some people are suggesting that this was a deliberate leak in other to increase the hype around the show – a marketing stunt. We’ll probably never know why, but it’s out there now. Experts don’t expect it to have as severe an impact as the Game of Thrones leak had either, simply because the official air time is so long time away and people will want more than just one episode.

Those who stick to the law will have to do with the 6minute trailer released earlier this month while those who don’t take that part so series can watch the full first episode. I for one can easily wait, especially because I don’t want to wait 6 months between watching the pilot episode and the following second one.

https://www.youtube.com/watch?v=Lm46-envrHo

NVIDIA GTX 980Ti Pictured

The GTX 980Ti, a hot topic for the last few weeks for NVIDIA to try to claw some of the limelight from AMD and the proposed graphics cards. We have heard about specifications, possible release dates, but now we have pictures.

There isn’t much to shout about there, the cooling shroud is that of a typical reference GTX branded graphic card; ‘GTX 980Ti’ smashed in the usual place, a black heat sink and a PCB that look very familiar to the Titan X.

Sadly, when we turn the card over, we can see the very absent backplate, Jensen says “they are not adding backplates, because it would affect tri-SLI airflow.” Just give me my backplate and I will shut up, seriously just give me my own personal engraved backplate.

Early benchmarks can tell us a lot about a graphics card, but the Ti range is slightly odd. Remember back to the GTX 780Ti, when that was released; it pretty much dethroned the original Titan. Let’s hope NVIDIA have reeled this in enough for the Titan X to still deserve the top spot.

With the imminent launch of the GTX 980Ti, are you waiting for the release to choose your new graphics card or will you be waiting on AMD? Let us know in the comments.

Thank you to VideoCards for providing us with this information.

GTA V User Accounts Hacked

There has been a lot of news about the popular game GTA V since its release for the PC platform. There have been issues with drivers, download speeds from the Steam network and a whole lot more.

However, it seems as though there is now another issue spreading across the Rockstar platform. Several users have reported their accounts being hacked into and modified within the past hour.

Several people have taken to the Rockstar support forums but are yet to hear a response from Rockstar themselves. One user, song414 posted :

“Apparently 2,400+ PC GTA V accounts were compromised. It was an initial list of 198 that was leaked when my account was hacked and now another list of 2,200+ accounts was a day or so ago.”

It looks as though there are several users on the website Multiplayer Game Hacking that are selling the hacked social club accounts for $15 a piece. More forum users have claimed that they have not been able to log in successfully with the details that were leaked online to the sharing site Pastebin, though this could mean that the account details have already been changed or they are hoax details.

Rockstar has not confirmed any reports or replied to any of the forum posts on their website. We recommend you change your Rockstar password as soon as possible to prevent people getting into your precious account.

Update: We’ve had feedback from our readers that a lot of the hacking issues may be focused around Rockstar not offering a form of double verification. Those who are concerned that Rockstar haven’t replied to your reports of being hacked, keep in mind that it usually takes them up to a week to respond to tickets and that the influx of issues relating to hacking and other issues, that time could be increased.

 

Image courtesy of RockStar Games

Kelly Brooks Private Pictures Hacked for the Second Time

So they are at it again, the hackers just can’t seem to leave the celebrities alone, especially when it comes to their own private images. This time, it is round two for former model Kelly Brooks who was targeted in the original hacking scandal back last year.

Despite Kelly Brooks denying that she had any private pictures, tweeting:

“The only nude photos you’ll ever see of me are the ones that I “leak” and the ones that my head are superimposed on”

She then confirmed that the most recent leak were in fact real during a Twitter conversation between her and David McIntosh.

Now this isn’t the first instance of this happening, back last year we had multiple celebrities hacking their private stash hacked and posted online, which has been dubbed ‘The Fappenning’. A few other celebrities caught up in this are Jennifer Lawrence and Kaley Cuoco.

What is there to gain for the hackers doing this to these people? Is it a form of ‘knocking them down a few pegs’? Ego boost? However, it can then be something blamed on the celeb’s themselves as to why they are taking these images and not storing them securely in the first place.

Thank you HuffPost for providing us with this information

Leaked Windows 10 Build Reveals Mail and Calendar Apps

Leakers seem to always be one step ahead, even if Microsoft provides regular updates to its Windows 10 Technical Preview. The latest Windows 10 leaked build (10051) seems to include some new updates, but the most important one is that the build comes with the latest Calendar and Mail apps.

The apps are said to be very basic at this stage, but they are functional at least. Users will notice that they feel and look better than the ones found on Windows 8.1, having Microsoft adding its swipe features that are currently available on iOS and Android clients. Other features include support for multiple accounts and an easy way to add Google or Exchange accounts. The Mail client seems to be branded as plain ‘Mail’ right now, but Microsoft has plans to change its name in the final release to Outlook.

Looking at the Calendar app, users will be excited to know that Microsoft has finally added support for Google Calendar. The current Windows 8.1 calendar has no such support, but Microsoft seems to be correcting its mistake in its next OS version. Its aesthetics have also changed compared to the current version, having it be more colourful and feel like an actual Office app this time. One strange thing that Microsoft did with this version of Calendar seems to be that it did not integrate it with the Mail app, meaning that your synched calendars are separate to your email accounts.

Thank you The Verge for providing us with this information

Leaked iPhone 6C Photos Leaked!

The next new iPhone may have just had pictures of it leaked by Future Supplier, that claim to show the rear casing of the rumored iPhone 6C. The authenticity of the photos has not been confirmed as yet, and there are noticeable differences to the back of the device compared to previous models.

The noticeable differences are the cutout for the camera flash, as well as the microphone and speaker holes, which are obviously in a different configuration. Setting this “6C” back from the current 6 models is the lack of a camera bump. As these are leaked photos that can’t be verified as of yet it is best to take them with a grain or two of salt, though many Apple leaks have turned out to be true in the past.

Source: 9to5 Mac

AMD A10-8850K Specifications Leaked

The Swedish Sweclockers website leaked more AMD information, this time about the Kaveri refresh APU codenamed Godavari.

The turbo frequency gets a 100MHz bump up to 4.1GHz, which is about 2.5% so not that bad. The base frequency stays the same at 3.7GHz when compared to the A10-7850K. The real improvement lies within the GPU upgrade where we see the GPU clock jump from 720 MHz to 856Mhz, a 19% improvement.

In addition to the A10-8850K, AMD will release other Kaveri refresh such as A10-8750, A8-8650K, A8-8650, A8-8550K, A8-8550, Athlon X4 870K, A10 Pro-8850B, A10 Pro-8750B, A8 Pro -8650B, A6 Pro-8550B, A4 Pro-8350B, etc.

Needless to say, they also get slightly elevated frequency treatments and should be compatible with all current FM2+ motherboards, though a BIOS upgrade might be needed.expected to be released in June or July this year. AMD is expected to release the processors  in June or July this year.

Thanks to SweClockers for providing us with this information

Metal Gear Solid V: The Phantom Pain Release Date Leaked

Metal Gear Solid is one of the most iconic video games in the history of video games, it’s been around since the NES era in the 80’s and it’s showing no sign of slowing down. Not only has Metal Gear Solid: Ground Zeros proved to be a hit, it’s made its way to PC, all the while we’re getting very close to the release of the next entry in the main series; Metal Gear Solid V: The Phantom Pain.

The release date has so far been a closely guarded secret, but it looks like the cat is out of the bag after several premium retailers leaked the information, including Microsoft Store and Rakuten (Play).

It now looks like we can expect the game to be launched on the 24th of February in the U.S. which is a Tuesday, the common day for major new releases.

Thank you Neogaf for providing us with this information.

Latest Sony Leaks Reveals How MPAA Want To Change DNS

It’s no secret that the MPAA are wanting to take stronger measures against piracy, but recent Sony leaks suggest they’re pushing to crack down even harder than they already are; they want to target the internet’s Domain Name System (DNS).

The plan was first proposed as part of SOPA a few years ago, but as many of you know, it failed to pass Congress after a lot of protesting and complaints. New information suggests that the MPAA’s lawyers have been looking for a way to use the tactic under existing law, allowing them to remove offending sites from DNS, effectively removing them from the internet phonebook and preventing people from finding the sites. Of course, the major issue here is, who defines what an infringing site is and will we just end up with a trimmed down internet that only shows sites deemed suitable for us.

“A takedown notice program, therefore, could threaten ISPs with potential secondary liability in the event that they do not cease connecting users to known infringing material through their own DNS servers,” the letter reads. “While not making it impossible for users to reach pirate sites (i.e., a user could still use a third-party DNS server), it could make it substantially more complicated for casual infringers to reach pirate sites if their ISPs decline to assist in the routing of communications to those sites.”

It’s a brute force tactic and one that would be very effective, but currently it’s also illegal to do so. Even current DMCA notices walk a fine line, as they’re often handed out broadly and without proper investigation. Worst case scenario is we end up with people using dodgy DNS servers, exposing themselves to severe security issues in the process.

SOPA may be dead, but those behind it are still trying to find ways of rebranding it and making it law.

Broadwell Based NUCs Spotted on Intel’s Site

Intel’s own website has now confirmed what has been rumoured for a while, the next generation NUC devices powered by Broadwell based CPUs; the CPU isn’t the only thing upgraded, as the new versions sport both M.2 slot and USB charging.

Three images have appeared on Intel’s website and the corresponding support sites for the new products are online as well. From those, we can get quite a bit of information. Next to the M.2 and default mini-PCIe slot, there is also a normal SATA port for an additional 2.5-inch drive, it has two DDR3L memory banks. The CPU isn’t visible on the photos “leaked”, as it is located on the rear of the motherboard.

Unconfirmed information also points toward wireless charging function and NFC support. ComputerBase, who spotted this first, reached out to Intel for a comment, but Intel didn’t want to comment further on upcoming products as “errors” and “leaks” of this kind happen from time to time. We can most likely expect to see Intel’s new NUC’s presented at CES 2015 in Vegas.

Thanks to ComputerBase for providing us with this information

Images courtesy of Intel

Assassin’s Creed Victory Leaked, Takes Place In London

It hasn’t been a great last month for Ubisoft, and to make things worse they’ve now had their upcoming part of Assassin’s Creed leaked. The next installment in the action-packed series through the animus is set to play in London during the Victorian era.

The new game has the name, or codename, Assassin’s Creed Victory and will be out next year for the PS4, Xbox One, and PC according to the sources familiar with the game. So it looks like the old console generation will be abandoned and focus shifted to the current. And there will only be one Assassin’s Creed game next year, not two like this time around.

The leak consists of a 7 minute “target gameplay footage” video that was leaked to Kotaku and that demonstrates the upcoming game. The video is said to be surprisingly slick and that it could pass for an E3 presentation. Sadly they don’t share the video, but instead just describe it and gave us a couple of screenshots. Most likely due to legal reasons. The video ends with the text that it was produced entirely in the Anvil engine, so it isn’t pre-rendered footage.

The video begins with an assassin climbing a tower and looking at London. Next it shows some potential side activities in a side alley with gambling and carriage street racing. After a leap down to the street the assassin accepts an assignment from a mysterious masked woman. The task: kill a man named Roderick Bulmer, who has been trafficking little girls for the assassins’ ancestral enemies. “The templars must receive our message,” says the woman. “You must send it in blood.”

It goes on to show some fight scenes and side activities like changing outfit as he chases the target through the train station. Inside the assassin uses what looks to be a new item, a grappling hook, to swing over the trains and kill his target. Next he jumps onto a moving train and fights off a couple more templars while crossing the River Thames. As the video ends we get a leap from the train into a conveniently placed haystack, the camera changes to the horizon and the Assassin’s Creed Victory logo appears.

The Ubisoft team in Quebec will be spearheading this game instead of the Montreal studio like in the previous parts. Maybe in a hope to eliminate some of the bad luck the last couple of releases had. Of course, like all Ubisoft games, this game will be developed across many of their studios all around the world, so it’s unknown how much difference it will make who is in the charge.

After the initial leak of this story on some outlets, Ubisoft issued the following statement: 

It is always unfortunate when internal assets, not intended for public consumption, are leaked. And, while we certainly welcome anticipation for all of our upcoming titles, we’re disappointed for our fans, and our development team, that this conceptual asset is now public.

The team in our Quebec studio has been hard at work on the particular game in question for the past few years, and we’re excited to officially unveil what the studio has been working on at a later date. In the meantime, our number one priority is enhancing the experience of Assassin’s Creed Unity for players.

Thanks to Kotaku for providing us with this information

Images courtesy of Kotaku

Raspberry Pi Model A+ Details Leaked

The Raspberry Pi foundation released the B+ model this summer and since then we’ve expected a new A+ model to appear as well. We got the first teaser during this years TechCrunch Disrupt in London where Upton confirmed that the A+ would be arriving to replace the current A model that didn’t sell too good.

We finally got some details about the upcoming model-refresh when the website Element14 briefly listed the A+ model over the weekend before quickly taking the link down again. But not before a couple of people got the images and relevant facts from the site.

The new Raspberry Pi A+ is basically a shrunk down version of the old B model but with the improvements made on the B+ model. The old 26-pin GPIO connector will be replaced by a 40-pin connector instead, the SD card slot will be replaced by a micro SD slot instead while the overall power consumption has been optimized and reduced. The new A+ model will also support power-hungry USB devices better than the current A model.

Thanks to CNXsoftware for providing us with this information

Images courtesy of CNXsoftware