msi-summit-b15-review:-average-business

MSI Summit B15 review: average business

This year, multiple companies primarily known for gaming laptops have been branching out into the portable business and productivity sector. It’s a crowded field already, but Razer made quite a splash with its excellent Razer Book 13, which has an elegant chassis, a 16:10 screen, and just a touch of its company’s signature RGB lighting.

In this review I’m looking at the Summit Series, which is MSI’s attempt to enter the same space. The series includes the Summit E line — which includes discrete GPU options and is priced to compete with top dogs like Dell’s XPS 15 — and the Summit B line, which starts at $999 and sits squarely in the midrange market.

I’m discussing the Summit B15 here — I looked at the Summit E15 last fall. The base B15 includes a Core i5-1135G7, 8GB of RAM, and a 512GB SSD. I tested the more expensive configuration, which costs $1,249 and has a Core i7-1165G7 (one of Intel’s top 11th Gen processors), 16GB of RAM, and a 1TB SSD. The system puts solid specs in a nice chassis, but there are a few misses that make it a bit expensive for what it offers.

The most appealing facets of the Summit-Series laptops are their look and build. They have a smooth black finish, an aluminum build, a classy backlit keyboard, and a lustrous new MSI logo on the lid and bottom bezel (no dragon to be found, a first for MSI). MSI claims the B15 has “military-grade durability,” and while that’s a difficult claim to test, there’s very little flex in the B15’s lid and keyboard. And at 3.53 pounds and 0.67 inches thick, it’s light for its size.

All in all, though, the B15 has a bit of a utilitarian look, especially compared to the E15. The latter has some small flourishes that add up to a classier vibe — there are gold accents around the touchpad and edges of the hinge, for example, where the B15 is straight black. One other thing about the B15’s chassis — it’s one of the worst fingerprint magnets I’ve ever seen. Touch the lid one time, and a visible smudge will remain. I used the sides of my fists to reposition the laptop while taking photos and still had to wipe it down between shots.

Don’t get me wrong, it’s a nice-looking and nice-feeling chassis. But there’s nothing exciting about it, and you’ll be wiping it down a lot if you want to maintain a clean look.

Two USB-A and a microSD on the right.

The useful port selection is a highlight, given the thin chassis. It includes a USB-C (supporting Thunderbolt 4, power delivery, DP 1.4a, and USB 4.0), two USB-A 3.2 Gen 2, one USB 3.2 Gen 1, one combination audio jack, one microSD reader, and one HDMI jack, in addition to the barrel-plug power port. You also get an RJ45 Ethernet dongle in the box, which is handy. I also appreciate having USB-A ports on both sides.

I also like the keyboard backlighting, which looks quite classy and wouldn’t be out of place in an office setting. The keys have a nice texture and 1.5mm of travel. Three nitpicks to note: First, the Fn key is half-sized, and I found it a pain to hit. Second, there was occasionally some internal rattle inside the deck, which was annoying. Third, the keys are more mushy than they are clicky, and they’re a bit shallower than the best keyboard keys around. Subjectively, I made more errors on this keyboard than I normally do.

Audio jack, HDMI, USB-C, USB-A, and power port on the left.

The display, similarly, is functional with caveats. It covers 98 percent of the sRGB gamut and 76 percent of AdobeRGB, and it maxes out at 258 nits. That’s an acceptable range of color coverage and is functional enough for office use, but it’s too dim to use easily in bright settings. I would expect more from a $1,249 laptop. Additionally, it uses a 16:9 aspect ratio, which is falling out of fashion among premium business laptops for a reason — it’s cramped for multitasking purposes.

The one component I really don’t like is the touchpad. It’s a bit small for a 15-inch laptop, and I sometimes hit the fingerprint sensor (built into the top-left corner) and the top plastic as I was scrolling. It also isn’t the smoothest I’ve ever used, and my fingers would skid across it a fair amount. Both the material and the click feel a bit plasticky compared to what you might find in a nicer model.

The Summit’s performance is good. I didn’t encounter any problems while running it through my usual office work. The integrated Iris Xe graphics aren’t suitable for serious gaming but can run lighter fare if that’s your thing. I could occasionally feel the system chugging under the keyboard while doing more intense tasks, but it never got too loud or too hot. You can swap to the “Silent” cooling profile in MSI’s control panel if fan noise is bothering you.

With that said, two disappointments came out of my testing period. First, the audio from the B15’s two speakers isn’t terrible and works just fine for video calls, but it delivers tinny percussion and practically no bass. I also heard occasional distortion at maximum volume, though I could eliminate it by bumping the sound down a notch. My test unit’s microphone also wasn’t working on Zoom calls, though it worked in other applications — I’ve asked MSI about this and will update this article if they figure it out.

Second disappointment: the battery life. Running the B15 as my daily driver at 200 nits of brightness, I only averaged five hours and 13 minutes. This isn’t entirely unexpected, as it only has a three-cell 52Wh battery — similar to what some 13-inch laptops come with at this point. On this 15-inch laptop, it’s not enough to power you through a full day if your workload is similar to mine (around a dozen Chrome tabs, Slack, occasional Zoom call, that sort of thing). One thing to note is that the B15 comes loaded with Norton, which I’ve seen be a serious battery drain in the past. I ran a battery trial before uninstalling that software and only got four and a half hours. After I nuked the bloatware, the B15 got closer to six.

All told, the Summit Series is a fine first step for MSI. In a market where business-focused laptops commonly cost multiple thousands of dollars, there’s absolutely an audience for something like the B15, which is light, attractive, and functional for just over the $1,000 mark. It looks and feels like a laptop you’d bring to a business meeting, and it has a top Intel processor with cooling that can handle it. Professionals on a budget could certainly do worse.

“Determined to succeed” is the Summit Series motto.

But given the unremarkable audio, battery life, and the other areas of the chassis, I still think that people who are willing to spend a bit more will benefit from doing so, especially folks who can live with less RAM and storage. A better screen, better speakers, and better battery life can make a big difference in the daily experience, and while the B15’s nice chassis, plentiful storage, and business-specific features are worth a premium for some folks, they won’t be everyone’s top priority.

Photography by Monica Chin / The Verge

hackers-exploit-qnap-vulnerabilities-to-turn-nas-devices-into-crypto-miners

Hackers Exploit QNAP Vulnerabilities to Turn NAS Devices Into Crypto Miners

(Image credit: Shutterstock)

Qihoo 360’s Network Security Research Lab said Friday that vulnerabilities in QNAP products have been exploited to turn NAS devices into cryptocurrency miners. Those devices were tampered with to hide their CPU usage, too, making it difficult for their owners to discover something was wrong if they checked their system’s diagnostics.

It seems like the efforts were pretty straightforward: Attackers reportedly exploited vulnerabilities in QNAP products to gain root access to them, installed mining software that was configured to use only half of the available CPU cores, and then covered their tracks by making CPU usage rates and temperatures appear normal.

The cryptocurrency mined by a single NAS isn’t worth the trouble of finding a vulnerability, exploiting it, and configuring it in this manner. The attackers probably had no intention of limiting their efforts to a single NAS, however. Schemes like this are all about achieving as much scale as possible as quickly as possible.

Put another way: It wouldn’t matter if each affected NAS only net the hackers $0.01 every day so long as they were able to infect a decent number of devices. They would also offset the costs of crypto mining—namely the upfront costs of buying a device and the ongoing cost of powering it—to their victims. All gain, no pain.

Note that while CPU mining of cryptocurrencies generally takes a back seat to GPU and ASIC mining, certain algorithms (specifically CryptoNightR used in Monero) can provide decent returns. Even an old Core i5-7600K 4-core CPU can do about $0.15-$0.20 per day (not counting electrical costs), while an i9-9900K can do nearly $0.50 per day. Infecting tens of thousands of NAS devices obviously gets into large sums of cryptocurrency very quickly, and Monero also happens to be a ‘privacy coin’ — meaning it’s not possible to track where coin transfers go.

The researchers didn’t offer many specifics, however, because they “speculate that there are still hundreds of thousands of online QNAP NAS devices with the vulnerability.” That’s a fraction of the nearly 4.3 million online devices they said they found using one of their security tools, but it’s still nothing to sneeze at.

That number might be lower if the researchers had followed the industry standard process of giving vendors 90 days to respond to vulnerability disclosures. Instead the researchers at 360 Netlab said they discovered the scheme on March 2 and disclosed it to QNAP on March 3. They published a blog post about it on March 5.

The researchers said they rushed to share their discovery with the public “due to the possible big impact” of the security flaws. We’ve reached out to QNAP to confirm the timeline established in 360 Netlab’s blog post as well as its potential impact and will update this post if the company responds.

For now, the researchers at 360 Netlab said the vulnerabilities it discovered were present in all of the QNAP NAS firmware released before August 2020. Ensuring a device has the most recent firmware should limit its exposure, and the researchers provided a list of IPs and URLs to block for additional security, too.