Connect with us
DAPA Banner
DAPA Coin
DAPA
COIN PAYMENT ASSET
PRIVACY · BLOCKDAG · HOMOMORPHIC ENCRYPTION · RUST
ElGamal Encrypted MINE DAPA
🚫 GENESIS SOLD OUT
DAPAPAY COMING

Tech

FBI warns of Handala hackers using Telegram in malware attacks

Published

on

Iran Telegram flag

The U.S. Federal Bureau of Investigation (FBI) warned network defenders that Iranian hackers linked to the country’s Ministry of Intelligence and Security (MOIS) are using Telegram in malware attacks.

In a flash alert issued on Friday, the FBI says Telegram is being used as command-and-control (C2) infrastructure by malware targeting journalists criticizing the Iranian government, Iranian dissidents, and various other oppositional groups worldwide.

The bureau linked these attacks to the Iranian-linked and pro-Palestinian Handala hacktivist group (also known as Handala Hack Team, Hatef, Hamsa) and the Iranian state-sponsored Homeland Justice threat group tied to Iran’s Islamic Revolutionary Guard Corps (IRGC).

In these attacks, the Iranian hackers are using social engineering to infect targets’ devices with Windows malware that enables them to exfiltrate screenshots or files from compromised computers.

Advertisement

“Due to the elevated geopolitical climate of the Middle East and current conflict, the FBI is highlighting this MOIS cyber activity,” the bureau said.

“This malware resulted in intelligence collection, data leaks, and reputational harm against the targeted parties. The FBI is releasing this information to maximize awareness of malicious Iranian cyber activity and provide mitigation strategies to reduce the risk of compromise.”

Iranian malware attacks abusing Telegram
Iranian malware attacks abusing Telegram (FBI)

This warning was published one day after the FBI seized four domains (handala-redwanted[.]to, handala-hack[.]to, justicehomeland[.]org, and karmabelow80[.]org).

The websites available via the seized clearnet domains were used by the Handala and Homeland Justice threat groups, and a third threat actor tracked as Karma Below, during their attacks and to leak sensitive documents and data stolen in cyberattacks targeting victims in the United States and around the world.

These actions follow Handala’s cyberattack on U.S. medical giant Stryker, in which they factory reset approximately 80,000 devices (including employees’ personal computers and mobile devices managed by the company) using the Microsoft Intune wipe command after compromising a Windows domain administrator account and creating a new Global Administrator account.

Advertisement

Last week, the FBI also warned that Russian intelligence-linked threat actors are targeting Signal and WhatsApp users in phishing campaigns that have already compromised thousands of accounts.

“The activity targets individuals of high intelligence value, such as current and former U.S. government officials, military personnel, political figures, and journalists,” said the FBI  in a public service announcement issued after Dutch and French cybersecurity authorities described similar account-hijacking operations.

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.

Source link

Advertisement
Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Tech

Out Of All The E-Bikes Sold At Walmart, Shoppers Say This One Is The Best

Published

on





We may receive a commission on purchases made from links.

With gas prices soaring, electric bikes have become a popular alternative for commuting. It’s a great way to reduce road congestion, air pollution, and encourage a healthy lifestyle. However, as e-bikes become more popular, it can be tough to know which one is best for you. Walmart has a huge collection of e-bikes, but one has stood out with a 4.8 out of 5 stars after 1,419 reviews. 

Advertisement

The Ancheer Gladiator electric vehicle is on sale for $430 at this time of writing, discounted from its usual $740 MSRP. However, customers feel it’s well worth the money. The 500W motor generates enough power to reach 20 miles per hour and the 48V, 10.4Ah lithium-ion battery offers 60 miles of range. Reviewers say that the battery performs well, with one reporting that their bike had only used about two-thirds of its battery life after a 35 mile trip into the countryside.

With a Shimano 3+7 shock absorption system and both front and rear disc brakes brakes, the Gladiator has capabilities that both city commutes and trail cruisers can appreciate. One reviewer said they bought the Gladiator for hunting, using it to go up and down steep dirt roads. Another added that it’s easy to pedal and that its LCD display is straightforward and easy to understand.

Advertisement

Is the ANCHEER Gladiator good for off-roading?

Ancheer squarely markets the Gladiator as a mountain bike, and much of the ad copy on the e-bike’s listing reflects that market segment. The brand mentions using the bike to cruise a mountain and explore new trails thanks to its ability to tackle “extreme conditions.” But how much of this is just PR language and how much is actual capability?

The truth seems to be closer to the latter. Someone who put 300 miles on their Gladiator, including a lot of pretty technical trails, found that the e-bike could really handle anything that was thrown at it without even getting a flat tire. They didn’t go so far as to call it a mountain bike, but they did report that riding it was a fun experience according to their Reddit review

There are going to be performance limitations when you get an e-bike that is this cost-effective. Multiple reviews on Walmart felt the brakes were nowhere near where they should be. It’s not going to be as capable as more trusted brands focused on off-roading, and that’s reflected in the price difference — Yamaha’s mountain e-bikes cost upward of $6,500. However, SlashGear has previously mentioned the Ancheer Gladiator in our list of e-bikes built for rough terrain since it’s still plenty capable and reliable on easier adventures.

Advertisement



Source link

Advertisement
Continue Reading

Tech

AI agents can now make you a personalised podcast on Spotify

Published

on

Spotify is leaning even harder into AI, and this time it wants your chatbot to double as a podcast producer.

The streaming service has launched a new beta feature called Save to Spotify. This lets AI agents like OpenClaw, Claude Code and OpenAI Codex generate personalised podcast-style audio briefings directly inside your Spotify library.

The idea is fairly simple: instead of reading through notes, schedules or research documents yourself, you can ask an AI assistant to turn them into an audio episode. You can then listen to it later. Spotify says the feature can handle everything from daily briefings and travel plans to study notes and deep dives into specific topics.

Once generated, the Personal Podcast is saved like a regular episode inside Spotify. It is ready to stream during a commute, workout or wherever else you normally catch up on podcasts.

Advertisement

Getting started is a little more developer-focused than Spotify’s usual features. Users need to install the Save to Spotify CLI tool from GitHub. Then they must connect their Spotify account through a browser login. After that, they prompt their AI agent to create a podcast. Spotify automatically adds the generated episode to the user’s library.

Advertisement

Spotify also shared a few examples of how to use the tool. One suggested prompt creates a five-minute morning briefing using your calendar, inbox and news feeds. Another turns holiday plans into an audio travel itinerary complete with restaurant recommendations and airport routes. You could even ask for a narrated explainer on this year’s World Cup.

The move shows how aggressively Spotify is embedding itself into the AI ecosystem beyond music streaming. The service already integrates with AI assistants like Claude and ChatGPT for playlist controls and recommendations. However, Save to Spotify pushes things much further by treating AI-generated audio as a first-class feature inside the app.

Advertisement

Spotify also quietly confirmed another AI update alongside the launch: users can now interact with the AI DJ in four additional languages beyond English and Spanish.

For now, Save to Spotify remains in beta. However, it’s a pretty clear sign of where Spotify sees the platform heading next — less passive listening, more AI-generated audio built around your own life.

Source link

Advertisement
Continue Reading

Tech

Latest OnePlus 16 rumours show OnePlus has something to prove

Published

on

The OnePlus 16 might still be months away, but if the latest rumours are accurate, OnePlus is preparing one of its most over-the-top flagship phones yet.

According to leaks shared by Digital Chat Station, the OnePlus 16 could arrive with a staggering list of specs. These may include a 240Hz display, LPDDR6 RAM, a 200MP zoom camera, and a massive 9,000mAh battery. In addition, Qualcomm’s next-gen Snapdragon 8 Elite Gen 6 Pro chip is also tipped to power the device.

Some of those upgrades make sense. Others feel like OnePlus is simply turning every number up to the maximum.

The jump to a 200MP zoom camera is probably the most believable move here. OnePlus phones have traditionally lagged behind Samsung and Google when it comes to camera consistency, so improving the telephoto hardware would be a logical next step.

Advertisement

The rest of the rumoured spec sheet, though, borders on excessive. A 240Hz refresh rate would comfortably outpace almost every flagship on the market. However, realistically, very few apps or games would fully support it. Even the OnePlus 15’s already-aggressive 165Hz panel felt beyond what most users actually needed.

Advertisement

The same goes for the supposed 9,000mAh battery. That would make it one of the biggest batteries ever fitted into a mainstream smartphone. In fact, it would be nearly double the size of the Galaxy S26 Ultra’s 5,000mAh cell.

What makes these leaks more interesting is the timing. Rumours surrounding OnePlus itself haven’t exactly been calm lately, with reports suggesting Oppo could scale back OnePlus operations in the US; the company has already scaled back operations in the UK and Europe in recent weeks.

Advertisement

Alternatively, they could potentially merge the brand more closely with Realme. Nothing has been confirmed either way, but the uncertainty has been enough to spark questions. People are wondering where OnePlus fits within Oppo’s wider strategy.

That’s partly why the OnePlus 16 rumours feel so aggressive. This doesn’t sound like a company playing it safe. Instead, it sounds like a brand trying to build a headline-grabbing flagship. Their aim is to remind people what made OnePlus exciting in the first place.

There’s also a reason to stay cautious. Digital Chat Station reportedly edited the original leak post to remove some of the speculation, suggesting the details may still be in flux. But even if only half of these rumours prove true, the OnePlus 16 already sounds like it’s aiming to be one of 2026’s most outrageous Android phones.

Advertisement

Advertisement

Source link

Continue Reading

Tech

Worm rubs out competitor’s malware, then takes control

Published

on

Security

All your compromised credentials are belong to us now instead of the other gang

There’s a mysterious framework worming its way through exposed cloud instances removing all traces of TeamPCP infections, but it’s not benevolent by a long shot: Whoever is behind this bit of malware may be cleaning up who came before, but only so they can take their place.

Advertisement

Discovered by security outfit SentinelOne’s SentinelLabs researchers and dubbed PCPJack for its habit of stealing previously compromised systems from TeamPCP, the worm was first spotted in late April hiding among a Kubernetes-focused VirusTotal hunting rule. It stood out from known cloud hacktools, said SentinelLabs, because the first action it always takes is to eliminate tools associated with TeamPCP attacks. 

The script didn’t stop there, though.

“We initially considered that this toolset could be a researcher removing TeamPCP’s infections,” SentielLabs said. “Analysis of the later-stage payloads indicates otherwise.”

“Analyzing this script led us to discover a full framework dedicated to cloud credential harvesting and propagating onto other systems, both internal and external to the victim’s environment,” SentinelLabs continued. In other words, this thing will harvest credentials from everywhere it can get its hands on, and then find new, unsecured cloud environment targets to spread itself to. 

Advertisement

TeamPCP came onto the scene late last year, and since then has made a name for itself primarily by undertaking a successful compromise of the Trivy vulnerability scanner. That act spread credential-harvesting malware which attackers then used to pivot to more valuable targets, and became one of the most notable supply chain attacks in recent memory. 

Unlike TeamPCP’s campaign, which relied on the spread of compromised software by human actors, this one spreads on its own accord. 

Infections start when already-infected systems look for exposed services, including Docker, Kubernetes, Redis, MongoDB, and RayML, as well as exposed web applications. Once it finds a vulnerable environment, it runs a shell script on the target system that sets up an environment to download additional payloads and searches for TeamPCP processes and artifacts to kill. 

That part of the infection downloads the worm itself, along with modules to enable lateral movement, parse credentials and encrypt them for exfiltration, and for scanning the web for new environments to infect. 

Advertisement

From there, the worm goes to work with the second module in its kit that conducts the actual credential thefts. This portion of the infection targets environment variables, config files, SSH keys, Docker secrets, Kubernetes tokens, and credentials from a list of finance, enterprise, messaging, and cloud service targets so long that we recommend taking a look at it here, or just assuming whatever you’re using is probably being targeted. 

SentinelLabs noted that the lack of a cryptominer in the malware package is unusual, and said the particular services it targeted suggests its goal is either conduct its own spam campaigns and financial fraud with the stolen data, or to make the data it harvests available to those planning similar crimes. 

The worm’s practice of removing TeamPCP files could be opportunistic, or could mean there’s drama going on in the cybercrime world. 

“We have no evidence to suggest whether this toolset represents someone associated with the group or familiar with their activities,” SentinelLabs noted. “However, the first toolset’s focus on disabling and replacing TeamPCP’s services implies a direct focus on the threat actor’s activities rather than pure cloud attack opportunism.”

Advertisement

Because this is a worm relying on unsecured cloud and web app instances ripe for targeting, mitigation recommendations are pretty simple: Keep your cloud platforms secure, and ensure authentication is required even for instances of things like Docker and Kubernetes that aren’t exposed to the internet. ®

Source link

Continue Reading

Tech

ShinyHunters demands ransom after Canvas hack

Published

on

Hackers give operator Instructure until 12 May to ‘negotiate a settlement’.

Cyber extortion group ShinyHunters has claimed responsibility for a second breach into edtech giant Instructure – this time, for hacking into the Canvas login portal.

The hackers replaced the Canvas login page with a message that claimed responsibility for an earlier Instructure breach and threatened to leak stolen data if ransom demands aren’t met.

“ShinyHunters has breached Instructure (again). Instead of contacting us to resolve it they ignored us and did some ‘security patches’,” the message seen by news publications read.

Advertisement

“If any of the schools in the affected list are interested in preventing the release of their data, please consult with a cyber advisory firm and contact us privately at TOX to negotiate a settlement. You have till the end of the day by May 12 2026 before everything is leaked,” it continued.

Bleeping Computer reported that the threat actors’ message appeared in around 330 educational institutions’ portals. It was up for approximately 30 minutes before being taken down. ShinyHunters told the publication that the stolen data contains private messages, user records and enrolment data.

Canvas is used by more than 8,000 educational institutions globally, including several in Ireland, such as the University of Galway and Munster Technological University (MTU). The platform enables communication between students and faculty, and provides coursework management and grading services.

Earlier this week, MTU informed users of a cybersecurity breach into Instructure, which it believed, at the time, did not affect its services. Yesterday (7 May), the institution advised caution, and told staff and students that Canvas remains safe to use.

Advertisement

Meanwhile, in a statement to SiliconRepublic.com, the University of Galway said: “Services have been restored following a relatively low level of disruption in the last 24 hours. We are continuing to liaise with the company affected to understand the full nature and extent of the breach.”

According to the company’s status page, Instructure first began experiencing issues at around 6.30pm Irish Standard Time yesterday. At the time of publication, the services are back online for “most users”.

Last Friday (1 May), Instructure disclosed that it experienced a cybersecurity incident perpetrated by a criminal threat actor. ShinyHunters claimed responsibility for the attack and claimed to have stolen 280m records. The threat actor also published a list of more than 8,800 institutions that were affected by its attacks on Canvas.

On 6 May, Instructure said the stolen information includes “certain identifying information of users at affected institutions, such as names, email addresses and student ID numbers, as well as as messages among users”.

Advertisement

In March, ShinyHunters was linked to a breach of the European Commission’s Europa.eu platform, where 350GB of data, across multiple databases, was reportedly accessed and stolen.

Don’t miss out on the knowledge you need to succeed. Sign up for the Daily Brief, Silicon Republic’s digest of need-to-know sci-tech news.

Updated 8 May, 12.34 pm: The article has been updated with a statement from the University of Galway.

Advertisement

Source link

Continue Reading

Tech

Instagram’s Messaging Encryption is Ending. Here’s What You Should Know

Published

on

Friday is the last day for your encrypted Instagram DMs. After May 8, the platform will no longer support the feature, it announced in a help post.

Instagram said in March that it would stop offering end-to-end encryption to its roughly 3 billion users worldwide. At the time, Meta said the feature, which required people on the platform to opt in, had a low adoption rate.

A Meta spokesperson told CNET that nothing has changed in its plans since that announcement and repeated a statement from March: “Very few people were opting in to end-to-end encrypted messaging in DMs, so we’re removing this option from Instagram in the coming months. Anyone who wants to keep messaging with end-to-end encryption can easily do that on WhatsApp.”

Advertisement

WhatsApp is also owned by Meta.

Read more: I Tried Signal, Telegram and WhatsApp, and This Is the One I’d Recommend

The change means that there’s no longer the option to keep private messages on Instagram shielded from potentially prying eyes. By default, if law enforcement agencies are given access to someone’s Instagram messages, there’s no encryption to prevent them from reading them. With the option enabled, Instagram users could keep messages private, with only the keys on their devices able to unlock them. However, anyone in an encrypted chat could also share messages with Meta if they were reporting an incident, or with anyone else if they chose. 

How to get your encrypted messages

According to the help page message, you’ll be able to download any encrypted messages you have: “If you have chats that are affected by this change, you will see instructions on how you can download any media or messages you may want to keep,” the company said. “If you’re on an older version of Instagram, you may also need to update the app before you can download your affected chats.”

Advertisement

Source link

Continue Reading

Tech

Cloudflare says AI made 1,100 jobs obsolete, even as revenue hit a record high

Published

on

Cloudflare on Thursday joined a growing list of tech companies — including Meta, Microsoft, and Amazon — that have reported increased revenue alongside massive layoffs, attributing both trends to their use of AI.

Cloudflare, which provides internet security and performance services to millions of websites worldwide, announced it was cutting its workforce by approximately 20%, which equates to 1,100 people, it said as part of its first quarter 2026 earnings report on Thursday.

“We’ve never done something like this in Cloudflare’s history,” co-founder and CEO Matthew Prince said Thursday on the quarterly conference call, marking the first mass layoff in the company’s 16-year history. The company is cutting people from all teams and geographies except for salespeople who carry revenue quotas, CFO Thomas Seifert detailed on the call.

The news of the workforce cuts came as the company reported quarterly revenues of $639.8 million, a 34% year-over-year increase and the highest single quarter in the company’s history. However, this was coupled with a loss of $62.0 million compared with losing $53.2 million in the year-ago quarter.

Advertisement

That widening loss, even as revenue surged, highlights a familiar paradox in Cloudflare’s story: the company is growing fast but has yet to turn a consistent profit. But the loss was a smaller percentage of revenue, and the quarter was coupled with a lot of other positive indicators. For instance, Cloudflare reported that it had over $2.5 billion in “remaining performance obligations,” a year-over-year growth of 34%. RPO is the favorite metric these days to indicate revenue under contract but not yet delivered.

Hence, Prince insisted, the 20% cuts were not to reduce expenses but were strictly because of its use of AI.

“Today’s actions are not a cost-cutting exercise or an assessment of individuals’ performance; they are about Cloudflare defining how a world-class, high-growth company operates and creates value in the agentic AI era,” Prince and Cloudflare co-founder and COO, Michelle Zatlyn, wrote in a related blog post about the layoffs.

Techcrunch event

Advertisement

San Francisco, CA
|
October 13-15, 2026

Prince acknowledged on the call that even though Cloudflare has been selling AI-powered products, it was at first cautious about adopting AI itself.

Advertisement

“Internally, the tipping point was last November. At that point, across our teams, we began to see massive productivity gains, team members that were two, 10, even 100 times more productive than they had been before. It was like going from a manual to an electric screwdriver,” he described.

“Cloudflare’s usage of AI has increased by more than 600% in the last three months alone,” he added.

Image Credits:SEC filings; Cloudflare press releases /

Prince highlighted the internal use of AI coding, saying that virtually the entire R&D team is now using the company’s own Workers platform — a tool that lets developers build and run software directly on Cloudflare’s global network — including its vibe coding feature. He also noted that 100% of the code produced this way and deployed for use in Cloudflare’s products is “now reviewed by autonomous AI agents.”

But it’s not just developers who are using AI internally, he said. “Employees across the company from engineering to HR to finance to marketing run thousands of AI agent sessions each day to get their work done.”

As a result, these highly productive, AI-powered employees require fewer support staff, he argued.

Advertisement

“A lot of the support people that provide support behind them, those roles aren’t going to be the roles that, you know, drive companies going forward,” Prince said.

Interestingly, Prince says that Cloudflare “will continue to hire people, and we’ll continue to invest in them because the people that are embracing these tools are just so much more productive than we’d ever seen before. I would guess that in 2027 we’ll have more employees than we did at any point in 2026.”

Cloudflare said it ended its first quarter before layoffs with a headcount of about 5,500.

The pattern Prince described — deploying AI gains as justification for workforce reductions even during a period of strong revenue growth — is fast becoming a familiar script across the tech industry. Whether it reflects true structural transformation or acts as convenient cover for cost discipline is a question that investors and employees will be wrestling with for some time to come.

Advertisement

When asked by an analyst on the call why the company needed to cut so deeply after such a good quarter, Prince said, “Just because you’re fit doesn’t mean you can’t get fitter.”

When you purchase through links in our articles, we may earn a small commission. This doesn’t affect our editorial independence.

Source link

Advertisement
Continue Reading

Tech

Nothing’s open earbuds are finally getting a second colour

Published

on

Nothing has expanded the Nothing Ear (open) lineup with a blue colourway, set to go on sale on 11 May, nearly a year after the earbuds launched exclusively in white.

The addition marks the first time the Ear (open) has received an alternative finish, a gap that stood out against the broader Nothing earbud range, which launched with black and yellow options across other models in 2024, giving the open-ear variant a noticeably more limited visual identity from the start.

That single-colour restriction was an unusual choice for Nothing, a brand that has leaned heavily into distinctive industrial aesthetics and bold colour pairings as a core part of its market positioning across both phones and audio hardware since launching in 2021.

The new blue sits on the more restrained end of the spectrum for Nothing, described as a subdued shade rather than the vivid tone seen on the recently released Nothing Phone (4a), which adopted a brighter, more saturated blue finish that drew considerable attention at launch earlier this year.

Advertisement

Nothing teased the colourway earlier this week through its community forum under the codename “Flaaffy,” with the formal announcement confirming the 11 May release date following subsequent posts on the brand’s X account, where a short promotional caption referenced the ocean, the sky, and Yves Klein among its blue-themed references.

Advertisement

The Ear (open) itself sits in a still-emerging product category, with open-ear earbuds occupying a distinct space from in-ear and over-ear designs, prioritising ambient awareness over isolation and finding a growing audience among commuters and outdoor users who prefer to keep some connection to their surrounding environment.

Nothing has not announced any changes to the hardware, driver configuration, or software features alongside the new finish, meaning the blue Ear (open) carries the same specifications as the original white model released in 2024.

The blue Nothing Ear (open) goes on sale on 11 May, with pricing expected to match the existing model’s retail rate.

Advertisement

Source link

Continue Reading

Tech

NASA’s Curiosity Mars Rover Was Stuck in a Rock: Watch It Free Itself

Published

on

Problems in space can be complex and dangerous. But NASA’s Curiosity Mars rover spent the end of April embroiled in a much simpler problem: It got stuck in a rock.

Curiosity’s woes began on April 25 when it drilled into a 28-pound rock NASA nicknamed Atacama. In a moment that could’ve come straight out of a Flintstones episode, Curiosity became stuck, and when it tried to pull its drill out, it yanked the whole rock with it. 

“Drilling has fractured or separated the upper layers of rock in the past, but a rock has never remained attached to the drill sleeve,” NASA said in a blog post.  

Advertisement

Such problems are comical here on Earth, where we can just shake the tool and the rock around until it’s free. Not so on Mars. Radio signals can take nearly half an hour to travel between Earth and Mars. Curiosity’s controllers had to send instructions and then wait upward of 30 to 45 minutes to see if the rover did anything. 

It took five days of troubleshooting, but NASA’s Jet Propulsion Laboratory crew finally freed Curiosity from its overly attached new friend on May 1. 

A black and white image of NASA's Curiosity wrestling with a rock stuck on its drill arm.

Curiosity shook and rotated the rock around in the air for days before finally shaking it off. 

Advertisement

NASA

Watch Curiosity free itself from Mars’ clingiest rock

NASA’s Curiosity is known for sending panoramas of the Martian surface. Still, this time, the cameras caught Curiosity doing something many construction workers have to deal with every day. NASA posted two GIFs of the event. The first is a head-on shot, and the other is from a higher angle.

In the GIFs, you can see Curiosity drilling into the rock, a task it’s done many times before. Except when the rover lifts its arm, the rock comes along with it. The rover pauses right at the start before giving in to its fate and lifting the rock off the ground. 

Since these are stitched images, you don’t see the drill arm’s finer movements, but NASA says the rock was tilted, and the drill was rotated and vibrated multiple times over the course of the events. The rock finally falls free at the end. 

Advertisement

A representative for NASA told CNET that the rover was not harmed in the incident.

Source link

Advertisement
Continue Reading

Tech

How Commodore Made A Sync Splitter

Published

on

Recently we featured an unusual Commodore 8-bit computer on the bench of [Tynemouth Software] — a Commodore 64 in a PET case. One of the unique parts it had was a board which took the composite output from the mainboard and split out the sync pulses for the monitor, and now they’re back to give it a full reverse engineer.

Perhaps the first surprise is why this board is necessary at all, after all one might expect an 8-bit machine to have those signals already at hand. It seems that the VIC chip inside the 64 did the combination to composite internally, so no such luck for the Commodore engineers. The board they designed then is a complete and very well-engineered sync splitter.

The technology of a video signal has its origins in the 1930s, so it’s not hard to extract both vertical and horizontal sync pulses with little more than a few passive components and a couple of transistors. The trouble with such a simple approach is that the output will work, but it will be messy and crucially, not have quite the required timing. The Commodore board uses the same approach as a simple discrete circuit of having a pair of filters with a time constant selected to catch the relevant sync, but extends it with extra logic. There are one-shots designed to provide clean pulses of exactly the right length, and gates that provide blanking to remove the chance of pulses ending up where they shouldn’t. The video path is the only part which might differ from a conventional sync splitter, because as the output from the 64 is all-digital, it takes a TTL-level through a gate rather than a more conventional analogue path.

Advertisement

You can see the rest of the machine in our original write-up, and we’re reminded that the boards haven’t been cleaned at their owner’s request, to preserve their patina.

Source link

Advertisement
Continue Reading

Trending

Copyright © 2025