Snynet Solution Logo
MON - SUN: 10 AM - 6 PM
+60 11 5624 8319


Is a Nvidia RTX 3070 Super on the way to take down AMD Big Navi?

Image Description

A new SKU listing by Nvidia indicates that the company is preparing a new RTX card positioned between the RTX 3070 and the RTX 3080 in anticipation of the launch of AMD's Radeon RX 6000-series next week.

According to TechPowerUp, this new card isn't the 16GB variant of the RTX 3070 - which was recently cancelled – assuming it ever existed in the first place – along with the 20GB RTX 3080, but will instead use a cut down GA102 GPU, the chip behind the RTX 3080 and 3090.  

This cut-down GA102 supposedly contains 7,424 CUDA cores on 58 streaming multiprocessors, 232 tensor cores, and 58 RT cores. The card will also use the larger 320-bit memory interface. 

It isn't known yet whether this new card will use the slower GDDR6 memory found in the RTX 3070 or the RTX 3080's GDDR6X.

While the specs indicate that the new SKU might be for a potential RTX 3070 Ti/Super, without a formal announcement from Nvidia it's impossible to know for sure. Either way, well find out more about this card if and when Nvidia deigns to reveal more information. Who knows, it might keep this graphics card up its sleeve until CES 2021, when we're expecting the RTX 3060 to appear. 


23 Oct 2020



Other Blog

  • Windows 10 update tackles nasty security threat

    Amid the Windows 11 hoopla, Microsoft ships the latest update to Windows 10 with improved security mechanisms.

    Read More
  • Thousands of mobile app cloud databases have been left exposed online

    Businesses continue to leave their cloud databases unsecured online despite the risk of company data and even user data being exposed.

    Following a three month study, Check Point Research (CPR) found 2,113 mobile applications whose databases were unprotected in the cloud and could be accessed by anyone with a browser

    The mobile apps with exposed databases ranged from those with more than 10k downloads all the way to very popular apps with over 10m downloads. CPR found a wide variety of sensitive data from the apps in question including chat messages, personal photos, phone numbers, emails, user names, passwords and more.

    Head of threat intelligence and research at Check Point Software, Lotem Finkelsteen explained how the firm's security researchers were easily able to find these exposed databases using the free online tool VirusTotal, saying:

    “In this research, we show how easy it is to locate data sets and critical resources that are open on the cloud to anyone who can simply get access to them by browsing. We share a simple method of how hackers can possibly do it. The methodology entails searching public file repositories like VirusTotal for mobile applications that use cloud services. A hacker can query VirusTotal for the full path to the cloud backend of a mobile application. We share a few examples of what we could find in there ourselves. Everything we found is available to anyone. Ultimately, with this research we prove how easy it is for a data breach or exploitation to occur. The amount of data that sits openly and that is available to anyone on the cloud is crazy. It is much easier to breach than we think.”

    Mobile apps with exposed databases

    In a new blog post, CPR provided several examples from its study without mentioning the names of the mobile apps that had left their cloud databases unsecured online.

    The first app is for a large department store chain in South America which has been downloaded more than 10m times. By searching VirusTotal, CPR was able to find API gateway credentials and an API key. To make matters worse, these credentials were in plain text and anyone would be able to read them and use them to access the accounts of the department store's customers.

    The next app is a running tracker application designed to track and analyze a runner's performance and it has been downloaded over 100k times. Its database contained users' GPS coordinates and other health parameters like their heart rates. With this information in hand, an attacker could create maps to track the whereabouts of the app's users.

    Next up, CPR found the exposed database of a dating app for people with disabilities. This database contained 50k private chat messages along with pictures of the senders. CPR also found the exposed database of a widely used logo maker application that has been downloaded more than 10m times. Inside the database there were 130k usernames, emails and passwords.

    In addition to these apps, CPR also came across the unsecured databases of a popular PDF reader as well as a bookkeeping application.

    In the same way that security experts recommend that consumers protect their smartphones, tablets and laptops with strong and complex passwords, so too should businesses that use cloud databases to store data for their mobile apps.

    Read More
  • Intel Core i9-11900K ‘golden’ CPUs now on sale at a price that’ll scare your wallet

    If you want more affordable 11th-gen chips with guaranteed overclocking potential, the Core i5-11600K is also available.

    Read More
  • The Nvidia RTX 3080 could be closer as another Turing GPU may have bit the dust

    The RTX 2070 Super is reportedly next in line for the chopping block as Nvidia prepares for Ampere's arrival

    Read More

Find Out More About Us

Want to hire best people for your project? Look no further you came to the right place!

Contact Us