ASUS ROG Phone II Features a 6.6″ 120Hz Display, Snapdragon 855+, and 6,000mAh Battery

ASUS ROG Phone II Features a 6.6″ 120Hz Display, Snapdragon 855+, and 6,000mAh Battery


ASUS has unveiled its next super smartphone built with mobile gaming in mind, the ROG Phone II. It’s decked out with an insane list of specs, and since we don’t yet have pricing, let’s try to enjoy them before we’re likely snapped back to reality.

ROG Phone II Specs

  • Display: 6.6″ FHD+ 120Hz AMOLED, HDR support, 240Hz touch sampling
  • Processor: Snapdragon 855+
  • GPU: Adreno 640
  • RAM: 12GB LPDDR4X
  • Storage: 128GB, 512GB UFS 3.0 flash storage
  • Cameras: Sony IMX586 sensor for up to 48MP capture + 13MP ultra-wide sensor
  • Battery: 6,000mAh
  • Software: During initial setup, a choice between more stock Android UI or ROG UI
  • Other: Dual front-facing speakers, quad-array noise canceling microphone, USB-C, in-display fingerprint reader, 3.5mm headphone jack, and ultrasonic AirTrigger shoulder buttons

As you can see, we have Qualcomm’s updated Snapdragon 855+ processor powering the device, a … Read the rest

Hackers abuse ASUS cloud service to install backdoor on users’ PCs

Hackers abuse ASUS cloud service to install backdoor on users’ PCs

Enlarge (credit: Jeremy Brooks / Flickr)

ASUS’ update mechanism has once again been abused to install malware that backdoors PCs, researchers from Eset reported earlier this week. The researchers, who continue to investigate the incident, said they believe the attacks are the result of router-level man-in-the-middle attacks that exploit insecure HTTP connections between end users and ASUS servers, along with incomplete code-signing to validate the authenticity of received files before they’re executed.

Plead, as the malware is known, is the work of espionage hackers Trend Micro calls the BlackTech Group, which targets government agencies and private organizations in Asia. Last year, the group used legitimate code-signing certificates stolen from router-maker D-Link to cryptographically authenticate itself as trustworthy. Before that, the BlackTech Group used spear-phishing emails and vulnerable routers to serve as command-and-control servers for its malware.

Late last month, Eset researchers noticed the BlackTech Group was using

Read the rest