Google to auction Android search slots in a bid to satisfy EU antitrust authorities

By Graeme Burton | News | 2 August 2019
Google will no doubt make a stack of cash, whatever happens

From 2020, consumers will be given a choice of three search engines - but the search providers will have to pay Google to participate

Google will present Android users in Europe with a choice of three alternative search engines from early 2020 in a move intended to mollify EU antitrust authorities.

Google was fined €4.3 billion in July last year by the European Commission over claims of Android market abuse. One of its three main reasons for levying the fine was the requirement by smartphone makers to pre-install the Google Search app and Chrome web browser as standard on all Android-branded smartphones.

Google introduced its response today in a blog posing.

"The choice screen will appear during initial device setup and will feature multiple search providers, including Google," it said. This will set a search provider on the home screen, set a default search provider in Google's Chrome browser and install the search app of the selected search company.

These measures will only apply to devices distributed in the European Economic Area, which may or may not include the UK by the time it is implemented.

But the sticking point is likely to be the demand from Google that search providers pay the company a set fee every time their service is selected over Google's.

The blog continued: "In each country auction, search providers will state the price that they are willing to pay each time a user selects them from the choice screen in the given country. Each country will have a minimum bid threshold.

"The three highest bidders that meet or exceed the bid threshold for a given country will appear in the choice screen for that country."

That requirement hasn't necessarily gone down well with rival search engine providers.

"A 'ballot box' screen could be an excellent way to increase meaningful consumer choice if designed properly. Unfortunately, Google's announcement today will not meaningfully deliver consumer choice," tweeted Gabriel Weinberg, founder and CEO of the privacy focused search engine and web browser DuckDuckGo.

He added: "A pay-to-play auction with only 4 slots means consumers won't get all the choices they deserve, and Google will profit at the expense of the competition. We encourage regulators to work directly with Google, us, and others to ensure the best system for consumers."

Ecosia, meanwhile, the not-for-profit search engine that makes a big play about being environmentally friendly, described the initiative as "really disappointing".

It continued: "If we choose to enter an auction, this will be potentially at the expense of millions of trees we could otherwise have planted… Users should select search engine options based on genuine interest, not on how much money is paid to the biggest fish in the sea."

The move today from Google comes after being on the receiving end of a series of fines from the European Commission over alleged anti-competitive practices in recent years. 

Indeed, since 2017, the European Union has relieved Google of a total of €9 billion in various fines, while last year the company paid more in EU fines than it did in corporate taxes

BT: We're ready to deliver full-fibre by 2025 - if the price is right

By Graeme Burton | News | 2 August 2019
BT has currently been rolling out FTTP at a rate of one million premises per year

BT backs Prime Minister Boris Johnson's pledge to roll-out fibre broadband nationwide in just five years

BT is "ready to play its part" to speed-up the roll-out of fibre-to-the-premise (FTTP) broadband across the UK, the company pledged today in a trading update.

It added, despite the challenge of achieving the target set by new Prime Minister Boris Johnson of rolling out fibre to 99 per cent of the country in just five years, that it "welcomes the government's ambition for full fibre broadband".

Currently, it admitted, Openreach's FTTP roll-out is running at around 20,000 premises per week (averaging just over a million a year), with 267,000 premises passed in the current quarter and 3.7 million hooked up to FTTP and Gfast exchanges to date.

We welcome the government's ambition for full fibre broadband across the country

On current figures, therefore, BT is connecting around one million premises to fibre per year, meaning that at the current rate it will take Openreach around 30 years to achieve a full-fibre roll-out across the UK.

Nevertheless, BT CEO Philip Jansen said that the company would step-up investment in a bid to achieve Johnson's target.

"On network investment, we welcome the government's ambition for full fibre broadband across the country and we are confident we will see further steps to stimulate investment," said Jansen.

He added: "We are ready to play our part to accelerate the pace of rollout, in a manner that will benefit both the country and our shareholders, and we are engaging with the Government and Ofcom on this."

According to Reuters, he also added that achieving Johnson's target would "be a major feat of engineering that will require significant investment, planning and also manpower", and hinted that the government would need to make it worth it for BT to step-up the investment required to achieve it.

The cost, according to Jansen, would be about £30 billion and Ofcom would need to work out a return on investment formula for BT to make it work from a financial perspective.

Let's say goodbye to the UK's mañana approach to broadband and unleash full fibre for all by 2025

During his leadership election campaign, Johnson had derided the existing targets to achieve full fibre by 2033, set by the government and Ofcom, as "laughably ambitious". He added:

"It's a disgrace that this country should suffer from a deep digital divide so that many rural areas and towns are simply left behind. The government has just set a new target for the 100 per cent roll-out of full fibre broadband by 2033.

"As a deadline, that is laughably unambitious. If we want to unite our country and our society, we should commit now to delivering full fibre to every home in the land not in the mid-2030s - but in five years at the outside.

"Let's say goodbye to the UK's mañana approach to broadband and unleash full fibre for all by 2025."

In 2018, BT pledged to connect at least three million homes to fibre by 2020 after a year earlier promising to speed-up its roll-out.  

At the same time as committing BT to stepping up its fibre roll-out, though, Jansen presented quarterly revenues down by one per cent to £5.6 billion and pre-tax profits also by £62 million to £642 million. Investment, however, increased by 11 per cent to £931 million compared to the same quarter in 2018.

New SystemBC proxy malware now being distributed through RIG, Fallout exploit kits, warn researchers

By Dev Kundaliya | News | 2 August 2019
SystemBC is thought to be part of a wider campaign that aims to infect systems with other malware

The malware uses SOCKS5 to evade detection, warns Proofpoint

Researchers at cyber security firm Proofpoint have identified a new proxy malware programme, dubbed SystemBC, capable of evading detection by security tools.

They warn that it is now being distributed via the Fallout and RIG exploit kits (EKs), which means that it is likely to be more widely deployed. 

According to Proofpoint, SystemBC is part of a wider campaign that aims to infect systems with various other forms of malware such as Danabot banking trojan.

Security specialists at Proofpoint first noticed SystemBC on 4th June when it was being distributed via Fallout EK.

On 6th June, the researchers observed an increase in Fallout activity, which resulted in the delivery of both SystemBC and Danabot banking trojan.

The threat actors also dropped a PowerEnum PowerShell script, which is commonly used by hackers for device fingerprinting and for exfiltrating stolen data to C2 servers. But, in this case, PowerEnum was observed "instructing the download of Danabot Affid 4 and a proxy malware DLL".

The researchers observed SystemBC malware again in July, this time being delivered by the Amadey Loader, which in turn, was distributed by RIG.

SystemBC malware is written in C++ and uses SOCKS5 to evade detection. The SOCKS5 proxies set up on victim machines by the malware enable its operators to create a tunnel to bypass internet content filters or skirt local firewalls. It also allows hackers to establish a connection to command-and-control (C2) server while hiding the real IP address.

So far, SystemBC has been found mainly in Asia, where high levels of Windows piracy commonly lead to unpatched systems.

Proofpoint researchers also revealed that they spotted SystemBC creators advertising an unnamed malware strain on an underground hacking forum in April, which appeared to be SystemBC. The advertisement also included images of the SystemBC backend.

Researchers also believe that the operators of Maze ransomware and DanaBot banking trojan likely used EKs to infect hosts and then used proxy capabilities of SystemBC to hide malicious traffic.

Proofpoint has advised organisations to regularly update and patch their Windows client and server OS as well as infrastructure devices to protect their systems from malware attacks. Legacy Windows systems susceptible to EKs such as Fallout should also be retired, according to Proofpoint.

EKs are web-based tools that exploit browser vulnerabilities to implant malware on computers. Sometime, they also cause users to be redirected malicious pages that trick users into installing other malware-containing apps.

In 2015, a report by Trustwave suggested that hackers were making 1,425 return on investment from exploit kits and ransomware schemes.

Amazon quizzed over AWS security following Capital One leak

By Nicholas Fearn | News | 2 August 2019
Politicians have called on Amazon to explain the Capital One security breach

House of Representatives committee plans to quiz Amazon over AWS security following Capital One data breach

Politicians in the US have quizzed Amazon about its security practices after a former employee was accused of causing a major data breach at Capital One.

A group of Republicans in the House of Representatives asked the e-commerce giant about its security protocols on Thursday, according to Reuters. 

In a letter addressed to Amazon CEO Jeff Bezos, Representatives Jim Jordan, Michael Cloud and Mark Meadows expressed their concerns about the data leak and its potential impact.

"The Capital One data was stored on a cloud storage service provided by Amazon Web Services," they wrote. "The outside individual who accessed the data was allegedly a former AWS employee."

Because AWS will provide the trusted internet connection and cloud support for the 2020 Census... the Committee may carefully examine the consequences of the breach

In particular, officials are worried about the potential implications of an insecure cloud system within government departments and could launch an investigation into the breach. 

The politicians continued: "Because AWS will provide the trusted internet connection and cloud support for the 2020 Census and could potentially run the Department of Defense's Joint Enterprise Defence Infrastructure cloud computing system, the Committee may carefully examine the consequences of the breach."

They went on to ask the company to attend a meeting about "this serious matter". The letter added: "We respectfully request a staff-level briefing no later than August 15, 2019 on the current status of AWS security protocols in place to ensure the security of sensitive personal and government data." 

On Monday, former AWS software engineer Paige Thompson was arrested in connection with a data breach at Capital One earlier this year that exposed the personal information of 106 million Americans and Canadians. 

She has been charged with computer fraud and abuse, and could face a prison term of up to five years and a fine of up to $250,000.

Between March and April this year, it is believed that Thompson obtained credentials for an administration account, searched for the names of folders and data buckets on Capital One's AWS storage space, and subsequently stole sensitive data. 

Further reports suggested that companies named in the leaked Capital one files, including Ford and Italian bank UniCredit, may also have been breached. However, Amazon said there is no evidence to support these claims

Speaking to Bloomberg, a spokesperson for AWS explained that the company had "reached out to the customers mentioned in online forums by the perpetrator to help them assess their own logs for any evidence of an issue". 


Public key spamming issue remains unfixed: Why is Tor so quiet about it?

By Nicholas Fearn | News | 2 August 2019

We tried downloading the keyserver-crashing 0x4E2C6E8793298290 but it's still 'too large' to import

Security flaws enabling attackers to spam the public keys of public organisations haven't been fixed, it has been claimed. 

Over the past few months, unknown attackers have been spamming the public keys of organisations like Tor so they cannot be used to verify code as they are too big to import and overload GPG.

In July, Bleeping Computer reported that attackers could halt OpenPGP installations and impact their ability to verify download packages by overwhelming them with dodgy signatures. 

The attack, codenamed CVE-2019-13050, can have a significant effect on the operations of SequoiaPGP, GnuPG and JavaScript OpenPGP.

In a security post, the US National Institute of Standards and Technology explains: "Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network.

"Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack."

But despite the severity of this flaw, people are concerned that organisations are not doing enough to prevent this known vulnerability from being leveraged in future attacks.

Responding to a blog by Tor, one person said: "Posts from Daniel Kahn Gilmore and R. J. Hansen make it clear that the key poisoning is very serious and has the potential to make it difficult for anyone to use GPG/PGP keys to verify the integrity of Tor Browser bundle downloads, Tails ISO images, Debian install ISO images, etc.

"Coming at a time when many Debian users are installing Buster (new stable) this attack has the potential to be particularly damaging. Unfortunately, it seems that has not yet posted prominent warnings to avoid trying to download the latest version of signing keys from the SKS keyserver network."

They claim that "Tor Project needs to address this issue with a dedicated blog post offering detailed advice on how to obtain and maintain a keyring holding the (public half of) the signing keys". 

The poster added: "The actors are unknown but it seems particularly vicious that they targeted DKG who has been trying to fix this vulnerability for years. But we know that in recent weeks the viciousness of apparently state sponsored cyberattacks has dramatically increased."

Computing tried to download and import the signing key for Tor Browser but was unable to do so. The public keyservers timed out and a download of the key was too large (25 MB) to import using GPG. In a blog post Mitigating Poisoned PGP Certificates (CVE-2019-13050) Hansen describes a way of stripping out the dodgy signatures to make the key usable once again. However, the issue is that GPG will generally try to update keys automatically, making the spammed public keys unusable. It is not possible to remove affected keys from public keyservers.

We are surprised that Torproject and other affected projects have still not publicised the issue a month after it arose, warning users to take defensive action. After all, what is the point of offering an ultra-secure anonymous browser if users cannot verify the downloaded code as genuine? Indeed the page How can I verify Tor Browser's signature? still recomments importing the key and the issue is marked as 'closed' on maintainer Micah Lee's Torbrowser-launcher repository on GitHub.

Warning over boom in web skimming cyber crime targeting online stores

By Dev Kundaliya | News | 2 August 2019
Malwarebytes claims to have blocked 65,000 Magecart data theft attempts in July alone

Malwarebytes claims to have blocked 65,000 web-skimming Magecart data theft attempts in July alone

Ecommerce companies have been warned of a summer surge in activity by web-skimming Magecart gangs, targeting organisations' online payments systems. 

The warning comes despite the high profile that Magecart attacks have had following last year's British Airways data breach. That is set to cost the company £183 million in GDPR fines levied by the ICO.

Before that, Ticketmaster was turned over after its payment systems were cracked over a period of months. Indeed, tens of thousands of Magecart attacks have been successfully carried out since the first attack almost 20 years ago.

The warning comes from security firm Malwarebytes, which this week revealed that it has blocked 65,000 Magecart data theft attempts in July alone.

Malwarebytes has picked up a large number of 'spray and pray' attacks on Amazon S3 buckets

Magecart attacks target organisations' payments system by taking advantage of security flaws in ecommerce systems. The gangs - there are several, all believed located in Russia and the CIS - then inject new Javascript code onto those pages to exfiltrate payment and personal details when customers check out.  

According to Malwarebytes, the majority of organisations targeted in web-skimming attempts in July were from the US (54 per cent) followed by Canada (16 per cent), Germany (seven per cent), the Netherlands (six per cent), France and the UK (five per cent) and Australia (three per cent).

Furthermore, in recent months, Malwarebytes has picked up a large number of 'spray and pray' attacks on Amazon S3 buckets, which are still on-going.

Web skimming has become big business for cyber criminals in recent years, involving numerous threat groups - from advanced actors to copycats - that try to steal sensitive data of customers.

It is becoming more difficult now to differentiate web-skimming groups by analysing code types alone

While skimmer code can help security experts to identify the different attack groups behind them, Malwarebytes warned it is becoming more difficult now to differentiate web-skimming groups by analysing code types alone, because several copycats are now re-using existing tools developed by other gangs.

Moreover, the attackers are frequently using various kind of obfuscation to hide their identities from security specialists. Obfuscation enables attackers to hide details about the servers under their control used to collect the stolen data in the first instance. 

Malwarebytes usually advises customers to visit only larger online shopping sites to protect themselves from Magecart threats. However, the company also warned that visiting only larger portals is no guarantee for consumers that buying online is risk-free.

On Thursday, the Retail and Hospitality ISAC (RH-ISAC) and the PCI Security Standards Council also released a joint bulletin warning online store operators and e-commerce sites about the growing threat posed by web- skimming activity.

Carlos Kizzee, RH-ISAC's vice president of intelligence, said he has no figures currently on the financial impact of attacks on online merchants, but breaches like the one at BA highlight how severe it could be - especially with the radically larger fines being levied under GDPR. 

Last month, security researches warned that the skimmer code by Magecart payment-system hackers has already infected more than 17,000 websites worldwide.

Pentagon to review $10 billion JEDI contract after Trump claimed it favoured Amazon

By Dev Kundaliya | News | 2 August 2019
President Trump. Image by David Bruyland from Pixabay

President Trump has claimed that Amazon was involved in a conspiracy to win the contract

The US Defence Secretary is reviewing the $10 billion Pentagon JEDI cloud computing contract over claims that it favours Amazon.

The contract was expected to be awarded this month to either Amazon or Microsoft, after the two cloud computing giants made it to the final shortlist. 

In a statement, Pentagon spokeswoman Elissa Smith said that Defence Secretary Mark Esper has decided to examine accusations of unfairness before a final decision is made on the contract.

"Keeping his promise to Members of Congress and the American public, Secretary Esper is looking at the Joint Enterprise Defence Infrastructure (JEDI) programme," Smith said in a statement late on Thursday.

I'm getting tremendous complaints about the contract with the Pentagon and with Amazon… They're saying it wasn't competitively bid

She continued: "No decision will be made on the programme until he has completed his examination."

When completed, the $10 billion contract would be one of the largest IT procurements ever made by the US government, and almost certainly the biggest single cloud-computing contract ever awarded. 

However, the contracting process for the project, which attracted bids from IBM, Oracle, Amazon, Google and Microsoft, has been marred by a number of complaints.

First, Google announced its withdrawal from the bidding in October after several employees of the company raised concerns over supply of Google's technology to the military.

Microsoft employees also published an open letter to management in October, urging the company not to bid on the project. The employees said they did not join Microsoft to "enhance lethality".

Later, IBM Corp and Oracle were eliminated from the race, leaving Microsoft and Amazon as the final contenders for the award. That decision led Oracle to file a lawsuit against the Department of Defence, as the company told the court that contract requirements for the project favoured Amazon.

Tensions on the project rose again last month when President Trump stated that Amazon was involved in a conspiracy to win the contract. Trump said that he had received several complaints from tech firms about the specifications of the contract, which appear to favour Amazon.

President Trump has spoken out against Amazon, founded by Jeff Bezos, on a number of occasions. Trump has also criticised the Bezos-owned Washington Post, accusing it of being a "lobbyist newspaper" for Amazon.

"I'm getting tremendous complaints about the contract with the Pentagon and with Amazon… They're saying it wasn't competitively bid," Trump said in a July 18 press release.

In past weeks, some lawmakers on Capitol Hill also sent letters to the president, urging him to delay the contract until officials re-examine the award process.

Secretary Esper who only assumed his job on 23rd July, said in a meeting with reporters recently that the JEDI deal is something that he wanted to take a "hard look at".

Objective critics of the deal have suggested that awarding one all-encompassing cloud computing contract to just one company naturally favoured the largest companies in the space. In addition, it would deny the Pentagon the opportunity to pick and choose the best or most suitable cloud services and technologies from across the sector, tying it in to just one vendor. 

Cyber criminals launched 3.5 billion malicious login attempts in just 18 months - Akamai

By Dev Kundaliya | News | 2 August 2019
Cybercriminals are now hitting financial firms at their weakest points

Half of all phishing attacks are targeting the financial sector, warns Akamai

Cyber crooks launched around 3.5 billion credential stuffing attempts during the 18-month period from November 2017 to April 2019 - with the financial sector targeted in particular.

That's according to the latest edition of the State of the Internet/Security report [PDF] released by content delivery giant Akamai, which focused on The Financial Services Attack Economy. In it, it claims that half of all organisations targeted by observed phishing domains were in the financial services sector.

According to Akamai, 94 per cent of the attacks against financial institutions were performed using just four techniques:

The attackers also resorted to DDoS attacks in 800 attempts to target financial services, either to exploit a web-based flaw or as a distraction to carry out credential stuffing attacks.

Notably, OGNL Java injection, which came to light due to the Apache Struts vulnerability, is still being used by cyber criminals - several years after the patches to address the flaw were issued.

Between 2nd December 2019 and 4th May 2019, Akamai identified 197,524 phishing domains, of which, 66 per cent directly targeted consumers.

"Criminals supplement existing stolen credential data through phishing, and then one way they make money is by hijacking accounts or reselling the lists they create," said Martin McKeay, editor of the State of the Internet Report's security edition.

"We're seeing a whole economy developing to target financial services organisations and their consumers," McKeay added.

According to McKeay, attackers are hitting financial firms at their weaker points: the web applications and consumers, and the approach seem to be working for them.

After attackers succeed in stealing user data, they create packages of information, called "bank drops", which include an individual's name, date of birth, address, driving license number, credit score, and social security number. All these details are then used to fraudulently open an account at a bank.

The techniques used by criminals to open those drop accounts are continuously investigated by financial institutions in efforts to stay ahead of the curve. However, they also need to realise that criminals sometimes recycle old techniques to carry out attacks on financial organisations.

Akamai's The Financial Services Attack Economy report has come within days after Capital One admitting that the personal information of 106 million Americans and Canadians was exposed in a data breach that occurred in March and April this year.

According to Capital One, names, emails, date of births, phone numbers, addresses, and self-reported incomes of customers who applied for a credit card from the company in past 14 years were illegally accessed by hackers.

This week, the security researchers at Positive Technologies also came up with results of their latest study, which suggests that hackers can bypass the £30 spending limit on Visa contactless cards by leveraging a series of security flaws.

Back in 2014, security researchers at Newcastle University had demonstrated a proof of concept exploit that would enable thieves to steal £1 million from stolen contactless payment cards.

Nationwide opens Digital Innovation Centre in London with plan to hire 750 tech specialists to support £1.3bn IT spending boost

By Graeme Burton | News | 1 August 2019
A new look Nationwide branch - but customers are increasingly banking on mobile

Nationwide pushed into opening technology centre in London in a bid to tap the specialists it needs for digital transformation

Nationwide is to open a Digital Innovation Centre in London to house 750 IT specialists as part of a major digital transformation across the building society.

A total of 1,000 staff will be based in The Post Building in London's Fitzrovia district. This location was selected for its proximity to several Underground stations, as well as Tottenham Court Road for Crossrail connectivity. "All of our market analysis demonstrated the new location is the best place to attract industry-leading talent within the FinTech capital of the world," said Nationwide CEO Joe Garner.

Insiders told Computing that it has taken the best part of a year to persuade Nationwide management of the need to open a centre in London

At the same time, the 173-year-old organisation is also expanding in its home base of Swindon, moving its existing 700 digital staff into Ramsbury House, a newly acquired site in the Wiltshire town.

The plan follows on from the revelation in September 2018 that the building society would spend an additional £1.3 billion on technology over the next five years - totalling £4.1 billion over the period.

"Working from The Post Building in Holborn, the teams will help the Society build upon its existing technology and create new platforms to meet the changing needs of Nationwide's 15 million members. The Society is actively recruiting into London, with around 750 roles across digital and technology being created over the coming months," the organisation revealed in a statement.

According to Nationwide CEO Joe Garner, the opening of offices in Fitzrovia represents a return to London - the organisation having been headquartered Holborn in 1894.

We now have over four million digitally active members, and that number is growing all the time

"The way our members are engaging with us is continually changing, and we recognise the importance of investing in the skills and capabilities needed to continue to meet our members' needs today and in the future," said Garner. "We now have over four million digitally active members, and that number is growing all the time."

Insiders told Computing that it has taken the best part of a year to persuade Nationwide management of the need to open a centre in London in order to attract the right mix of IT skills in the volumes it needs into the building society. Being based in Swindon, Nationwide has struggled to attract all the skilled IT staff required to conduct a top-to-bottom digital transformation.

Like many organisations in the finance sector, 15-million member Nationwide faces a growing challenge from start-up banks, such as Revolut and Monzo, offering branch-less banking services via mobile and online apps.

"This is about recruiting skills and experience into Nationwide, alongside developing talent from within our current workforce, so that we have the broad range of skills needed to deliver the Society's digital and data transformation strategy," said Garner.

Aubrey Stearn, CTO of Nationwide's Digital Accelerator Platform (NDAP), provided the keynote at Computing's DevOps Summit Live 2019 event in March this year

She revealed how Nationwide re-structured earlier this year in a bid to become more digitally focused. 

Intel unveils first 10th gen 10nm Core processors for laptops and 2-in-1s

By Computing News | News | 1 August 2019
Intel's 10nm Ice Lake CPUs don't, on the surface, appear to offer Earth-shattering performance

Eight of the 11 Ice Lake processors also offer Iris Plus integrated graphics supporting Adaptive Sync

Intel has finally unveiled its long-awaited 10nm Ice lake CPUs, with a range of 11 Core processors intended for laptops and 2-in-1 devices.

The U- and Y-series microprocessors sip between 9W and 25W of power, and start with the two core, four -thread Core i3-1000G1. This Y-series chip runs at a base frequency of just 1.1GHz, but is capable of boosting up to 3.2 GHz on both single and dual cores. The integrated graphics, meanwhile, run at 900MHz.

However, if you want Iris Plus graphics capabilities, you'll have to fork out a little more for the Core i3-1000G4, which has identical specs aside from the uprated integrated graphics capabilities. Both use either 9W or 12W on turbo and are therefore intended for niche mobile devices.

The Ice Lake Y-Series CPUs run all the way up to a Core i7-1060G7, which offers four cores and eight threads, double the cache at 8MB and the same TDP. However, it runs at a standard base frequency of 1.2GHz, boosting to 3.8GHz on a single core and 3.4GHz on multi-core. The Iris Plus integrated graphics runs at 1.1GHz.

  Processor Number Graphics Cores / Threads Graphics (EUs) Cache Nominal TDP/
ConfigUP TDP
Base Freq (GHz) Max Single Core Turbo (GHz) Max All Core Turbo (GHz) Graphics Max Freq (GHz) Intel® DL Boost /

Intel® GNA

U-Series Intel® Core™ i7-1068G7 Intel® Iris® Plus 4/8 64 8MB 28W 2.3 4.1 3.6 1.10
Intel® Core™ i7-1065G7 Intel® Iris® Plus 4/8 64 8MB 15W/25W 1.3 3.9 3.5 1.10
Intel® Core™ i5-1035G7 Intel® Iris® Plus 4/8 64 6MB 15W/25W 1.2 3.7 3.3 1.05
Intel® Core™ i5-1035G4 Intel® Iris® Plus 4/8 48 6MB 15W/25W 1.1 3.7 3.3 1.05
Intel® Core™ i5-1035G1 Intel® UHD Graphics 4/8 32 6MB 15W/25W 1.0 3.6 3.3 1.05
Intel® Core™ i3-1005G1 Intel® UHD Graphics 2/4 32 4MB 15W/25W 1.2 3.4 3.4 0.90
Y-Series Intel® Core™ i7-1060G7 Intel® Iris® Plus 4/8 64 8MB 9W/12W 1.0 3.8 3.4 1.10
Intel® Core™ i5-1030G7 Intel® Iris® Plus 4/8 64 6MB 9W/12W 0.8 3.5 3.2 1.05
Intel® Core™ i5-1030G4 Intel® Iris® Plus 4/8 48 6MB 9W/12W 0.7 3.5 3.2 1.05
Intel® Core™ i3-1000G4 Intel® Iris® Plus 2/4 48 4MB 9W/12W 1.1 3.2 3.2 0.90
Intel® Core™ i3-1000G1 Intel® UHD Graphics 2/4 32 4MB 9W/12W 1.1 3.2 3.2 0.90

Ice Lake U-Series and Y-Series line-up in full

Indeed, across the range the base frequency is well under 2GHz on all parts except the flagship U-series Core i7-1068G7, which runs at base speed of 2.3GHz with a TDP of 2.3GHz, but boosting on single core up to 4.1GHz and 3.6GHz on multicore.

On the surface, none of Ice Lake processors released by Intel today look like offering Earth-shattering performance. Availability of the devices also remains to be seen. However, around 35 laptops from big-name manufacturers are slated to emerge before the end of the year.

Intel demonstrated Ice Lake CPUs at CES 2019 in January. The promise that 10nm Ice Lake CPUs would appear "later this year" was reiterated by Intel's Gregory Bryant, general manager of the Client Computing Group, in May.