<td id="kg486"><optgroup id="kg486"></optgroup></td>
<button id="kg486"><tbody id="kg486"></tbody></button>
<li id="kg486"><dl id="kg486"></dl></li>
  • <dl id="kg486"></dl>
  • <code id="kg486"><tr id="kg486"></tr></code>
  • New Intel security flaws could slow some chips by nearly 20%

    May 16, 2019

    FILE - In this Oct. 3, 2018, file photo the Intel logo appears on a screen at the Nasdaq MarketSite, in New York’s Times Square. Intel has revealed another hardware security flaw that could affects millions of machines around the world. The chipmaker said Tuesday, May 14, 2019, that there’s no evidence of bad actors exploiting the bug, which is embedded in the architecture of computer hardware.Photo/Richard Drew, File)

    Intel Corp and a group of security researchers on Tuesday said they had found a new set of security flaws in its processors that will be difficult to fix and are related to problems found last year.

    Intel calls the newly discovered flaws "Microarchitectural Data Sampling," or MDS for short. The vulnerability could let hackers read nearly all data flowing through one of Intel’s chips, though the company said the attack is difficult to carry out and that it has not seen it used outside of labs.

    Intel chips released this year contain a fix for the bug. But previous generations of chips will need to be patched, and in some instances that fix could slow the performance of the chip by as much as 19%, Intel said in a post announcing the news.

    Intel last year disclosed that hackers could potentially read sensitive data on its processors, which power most data centers and personal computers, by exploiting a feature called speculative execution, in which the chip tries to guess which computations it will carry out ahead of time in an effort to speed up the chip.

    The so-called Meltdown and Spectre flaws came to be known as side-channel attacks. The flaws - along with how Intel handled its public response - sent its stock price tumbling as investors guessed about how customers would respond to the headaches of patches and performance slowdowns. Intel also faced questions from lawmakers about why it did not disclose the vulnerability to U.S. cybersecurity officials before it was made public.

    At the time, security researchers and Intel said similar side-channel flaws were likely to be found in the future. Intel said Tuesday that its security researchers found the new flaws, which were also reported to Intel by external security researchers.

    Source: ETCISO


    Copyright ? 2017, G.T. Internet Information Co.,Ltd. All Rights Reserved.
    主站蜘蛛池模板: 日本道精品一区二区三区| 婷婷综合激情网| 久久国产精品女| 极品丝袜系列列表| 亚洲日韩区在线电影| 波多野结衣的av一区二区三区| 内射毛片内射国产夫妻| 美女女女女女女bbbbbb毛片| 国产丝袜视频一区二区三区| 黑人3p波多野结衣在线观看| 国产精品91在线播放| 18无码粉嫩小泬无套在线观看| 国产麻豆剧传媒精品国产AV | 欧美国产精品久久| 亚洲欧美成人一区二区三区| 涂了媚药的玉势| 亚洲黄色片在线观看| 男人女人边摸边吃奶边做| 全肉高h动漫在线看| 精品国产亚洲AV麻豆| 午夜欧美精品久久久久久久| 美女扒开胸罩露出奶了无遮挡免费| 国产一级免费片| 色综合网站在线| 国产一区二区在线观看app| 蜜桃一区二区三区| 国产三级无码内射在线看| 草莓视频未满十八勿网站| 国产乱子伦一级毛片| 色综合久久久久无码专区| 国产三级在线免费观看| 色综合久久98天天综合| 国产xxxx视频在线观看| 自慰被室友看见强行嗯啊男男| 国产一区二区不卡老阿姨| 脱裙打光屁股打红动态图| 双性h啪啪樱桃动漫直接观看| 精品欧美一区二区三区久久久| 午夜网站在线观看免费网址免费| 综合久久给合久久狠狠狠97色| 午夜人屠h精品全集|