<blockquote id="pl83f"><p id="pl83f"></p></blockquote>
<s id="pl83f"><li id="pl83f"></li></s>

      
      
      <sub id="pl83f"><rt id="pl83f"></rt></sub>

        <blockquote id="pl83f"><p id="pl83f"></p></blockquote>
        <sub id="pl83f"><rt id="pl83f"></rt></sub>
        女人的天堂av在线播放,3d动漫精品一区二区三区,伦精品一区二区三区视频,国产成人av在线影院无毒,亚洲成av人片天堂网老年人,最新国产精品剧情在线ss,视频一区无码中出在线,无码国产精品久久一区免费

        Intel discloses new security flaw in its chips

        Source: Xinhua| 2019-05-15 13:35:39|Editor: ZX
        Video PlayerClose

        SAN FRANCISCO, May 14 (Xinhua) -- Intel on Tuesday discloses a new security flaw in its processors that could allow potential attackers to steal sensitive data from Intel-powered computers or even cloud servers.

        The world's top chipmaker called the new group of vulnerabilities embedded in the architecture of computer hardware as Microarchitectural Data Sampling (MDS).

        "MDS is a sub-class of previously disclosed speculative execution side channel vulnerabilities and is comprised of four related techniques," said Intel.

        The security bug is capable of taking advantage of the vulnerabilities of Intel chips when a speculative execution is performed by the processors to improve chip performance.

        Intel said the flaw was discovered by its internal researchers and partners, which was also reported by other researchers from other companies.

        The security flaw was the most recent revelation of Intel chip bugs since two notorious hardware viruses involving Intel processors, nicknamed Spectre and Meltdown, caused panic among computer users last year.

        Some security experts said the new chip bug could affect almost all computers powered by Intel chips dating back to 2011.

        Despite its potential threat, Intel said "there are no reports of any real-world exploits of these vulnerabilities" because the actual exploitation of MDS is very complex.

        The company noted that it has addressed the hardware problem in its processors, including a fix to its future processors, with microcode updates.

        Other tech companies such as Google, Amazon and Microsoft have also released security advisories on their respective websites to fix the problem on Tuesday.

        TOP STORIES
        EDITOR’S CHOICE
        MOST VIEWED
        EXPLORE XINHUANET
        010020070750000000000000011100001380602631
        主站蜘蛛池模板: 午夜福利国产片在线视频| 九九热在线精品免费视频| 亚洲sm另类一区二区三区| 久久天天躁狠狠躁夜夜avapp| 国产精品久久久久久影视| 欧美人成精品网站播放| 野花韩国电影免费观看在线| 国产综合精品一区二区三区| 久久精品人妻无码一区二区三区| 欧美日本一区二区视频在线观看| 欧美成年性h版影视中文字幕| 花式道具play高h文调教| 潮喷失禁大喷水无码| 亚洲女同精品一区二区久久 | 亚洲伊人久久综合成人| 天堂va欧美ⅴa亚洲va在线| 一本大道无码av天堂| 玩弄放荡人妻少妇系列| 狠狠婷婷色五月中文字幕| 97久久超碰国产精品旧版| 亚洲中文字幕国产综合| 肉大捧一进一出免费视频| 亚洲国产精品区一区二区| 好好热好好热日韩精品| 韩国美女福利视频一区二区| 国产福利酱国产一区二区| 亚洲中文字幕精品一区二区三区| 亚洲国产高清第一第二区| 中文字幕第一页国产| 国内精品视频一区二区三区八戒| 亚洲色欲色欲www在线观看 | 蜜臀视频在线观看一区二区| 人妻中文字幕不卡精品| 国产精品涩涩涩视频网站 | 精品少妇后入一区二区三区| 日韩在线成年视频人网站观看| 91久久精品美女高潮不断| AV区无码字幕中文色| a级黄色毛片免费播放视频| 韩国三级在线 中文字幕 无码| 亚洲一本大道在线|