Vulnerabilities / Threats //

Insider Threats

Qualcomm Details Faster Snapdragon Chipset

The MSM8960, heading for smartphones and tablets, supports 4G/LTE and WCDMA and CDMA2000 networks.

Qualcomm journeyed to New York City this week to reveal some new Snapdragon processor specs -- more powerful and less power-consuming -- about its upcoming MSM8960 Snapdragon processor. Noting that the Snapdragon is already the workhorse processor in most of the world’s smartphones, Steve Mollenkopf, Execitive VP and Group President of Qualcomm CDMA Technologies, said the device is expected to be the first multimode chip to support 4G/LTE with support for WCDMA and CDMA2000 networks. Mollenkopf spoke during an analysts meeting this week.

“The MSM8960 will offer upgraded graphics capabilities with four times the performance of the original Snapdragon chip,” according to Qualcomm, adding that it will also feature “built-in integrated connectivity for WLAN, GPS, Bluetooth and FM.” The chipsets, which will be based on a new CPU core, are earmarked for a new generation of smartphones and tablets.

The MSM8960 dual-core chipset will be the first Qualcomm chip built on 28-nanometer (nm) process technology that the company says will enable a quadrupling of graphics capabilities over the original Snapdragon chip while also delivering five times the performance and 75% less power overall. Mollenkopf noted that market researchers predict 2.5 billion smartphones will be shipped between 2011 and 2014; he indicated that Qualcomm has aspirations of being included in the majority of those devices. Qualcomm’s MSM8960 is scheduled to sample next year.

Qualcomm has regained its momentum after a digression to Ultra Mobile Broadband, which never took off, as the company focuses more on LTE and combination 3G/LTE chipsets. The MSM8960 is aimed at smoothing the move to the next generation of smartphones and tablets. In its most recent quarterly financial report announced this month, Qualcomm said it sold four times as many Snapdragons in its second fiscal half-year as it did in the first half.

SEE ALSO:

Qualcomm Goes Beyond PCs With Kayak, Snapdragon

Qualcomm Shows Off New Mobile Chips

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Government Shutdown Brings Certificate Lapse Woes
Curtis Franklin Jr., Senior Editor at Dark Reading,  1/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6443
PUBLISHED: 2019-01-16
An issue was discovered in NTPsec before 1.1.3. Because of a bug in ctl_getitem, there is a stack-based buffer over-read in read_sysvars in ntp_control.c in ntpd.
CVE-2019-6444
PUBLISHED: 2019-01-16
An issue was discovered in NTPsec before 1.1.3. process_control() in ntp_control.c has a stack-based buffer over-read because attacker-controlled data is dereferenced by ntohl() in ntpd.
CVE-2019-6445
PUBLISHED: 2019-01-16
An issue was discovered in NTPsec before 1.1.3. An authenticated attacker can cause a NULL pointer dereference and ntpd crash in ntp_control.c, related to ctl_getitem.
CVE-2019-6446
PUBLISHED: 2019-01-16
An issue was discovered in NumPy 1.16.0 and earlier. It uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, as demonstrated by a numpy.load call.
CVE-2019-6442
PUBLISHED: 2019-01-16
An issue was discovered in NTPsec before 1.1.3. An authenticated attacker can write one byte out of bounds in ntpd via a malformed config request, related to config_remotely in ntp_config.c, yyparse in ntp_parser.tab.c, and yyerror in ntp_parser.y.