<blockquote id="pl83f"><p id="pl83f"></p></blockquote>
<s id="pl83f"><li id="pl83f"></li></s>

      
      
      <sub id="pl83f"><rt id="pl83f"></rt></sub>

        <blockquote id="pl83f"><p id="pl83f"></p></blockquote>
        <sub id="pl83f"><rt id="pl83f"></rt></sub>
        女人的天堂av在线播放,3d动漫精品一区二区三区,伦精品一区二区三区视频,国产成人av在线影院无毒,亚洲成av人片天堂网老年人,最新国产精品剧情在线ss,视频一区无码中出在线,无码国产精品久久一区免费

        Intel discloses new security flaw in its chips

        Source: Xinhua| 2019-05-15 13:35:39|Editor: ZX
        Video PlayerClose

        SAN FRANCISCO, May 14 (Xinhua) -- Intel on Tuesday discloses a new security flaw in its processors that could allow potential attackers to steal sensitive data from Intel-powered computers or even cloud servers.

        The world's top chipmaker called the new group of vulnerabilities embedded in the architecture of computer hardware as Microarchitectural Data Sampling (MDS).

        "MDS is a sub-class of previously disclosed speculative execution side channel vulnerabilities and is comprised of four related techniques," said Intel.

        The security bug is capable of taking advantage of the vulnerabilities of Intel chips when a speculative execution is performed by the processors to improve chip performance.

        Intel said the flaw was discovered by its internal researchers and partners, which was also reported by other researchers from other companies.

        The security flaw was the most recent revelation of Intel chip bugs since two notorious hardware viruses involving Intel processors, nicknamed Spectre and Meltdown, caused panic among computer users last year.

        Some security experts said the new chip bug could affect almost all computers powered by Intel chips dating back to 2011.

        Despite its potential threat, Intel said "there are no reports of any real-world exploits of these vulnerabilities" because the actual exploitation of MDS is very complex.

        The company noted that it has addressed the hardware problem in its processors, including a fix to its future processors, with microcode updates.

        Other tech companies such as Google, Amazon and Microsoft have also released security advisories on their respective websites to fix the problem on Tuesday.

        TOP STORIES
        EDITOR’S CHOICE
        MOST VIEWED
        EXPLORE XINHUANET
        010020070750000000000000011100001380602631
        主站蜘蛛池模板: 亚洲国产日韩精品久久| 越南毛茸茸的少妇| 国产精品国产三级在线专区| 久久九九亚洲国产成人| 中国性欧美videofree精品| 日韩一区二区在线观看的| 青草99在线免费观看| 久久99精品久久久久久青青| 中文国产成人久久精品小说| 蜜臀av在线无码国产| 国产永久免费高清在线观看| 欧美FREESEX黑人又粗又大| 国产精品久久久久久久久久久久人四虎| 亚洲午夜福利精品一二飞| 插入中文字幕在线一区二区三区| 午夜日本永久乱码免费播放片 | 老熟妇乱子交视频一区| 日韩av片无码一区二区不卡| 亚洲精品二区在线播放| 国产一区二区丝袜美腿| 精品国产成人午夜福利| 亚洲精品天堂在线观看 | 亚洲性美女一区二区三区| 9久9久热精品视频在线观看| 国产第一页浮力影院入口| 中文字幕日本在线免费| 黄色亚洲一区二区在线观看| 精品无套挺进少妇内谢| 亚洲色在线v中文字幕| 精品国产美女福到在线不卡| 亚洲欧美日韩高清一区二区三区| av网站免费线看精品| 在线国产毛片| 精品国产一区二区三区2021| 男人的天堂va在线无码| 国产一区二区不卡91| 午夜DY888国产精品影院| 99久久99这里只有免费费精品| 久久国产精品成人免费古装| 国产精品午夜福利资源| 丰满人妻熟妇乱又伦精品app|