<blockquote id="pl83f"><p id="pl83f"></p></blockquote>
<s id="pl83f"><li id="pl83f"></li></s>

      
      
      <sub id="pl83f"><rt id="pl83f"></rt></sub>

        <blockquote id="pl83f"><p id="pl83f"></p></blockquote>
        <sub id="pl83f"><rt id="pl83f"></rt></sub>
        女人的天堂av在线播放,3d动漫精品一区二区三区,伦精品一区二区三区视频,国产成人av在线影院无毒,亚洲成av人片天堂网老年人,最新国产精品剧情在线ss,视频一区无码中出在线,无码国产精品久久一区免费

        Intel discloses new security flaw in its chips

        Source: Xinhua| 2019-05-15 13:35:39|Editor: ZX
        Video PlayerClose

        SAN FRANCISCO, May 14 (Xinhua) -- Intel on Tuesday discloses a new security flaw in its processors that could allow potential attackers to steal sensitive data from Intel-powered computers or even cloud servers.

        The world's top chipmaker called the new group of vulnerabilities embedded in the architecture of computer hardware as Microarchitectural Data Sampling (MDS).

        "MDS is a sub-class of previously disclosed speculative execution side channel vulnerabilities and is comprised of four related techniques," said Intel.

        The security bug is capable of taking advantage of the vulnerabilities of Intel chips when a speculative execution is performed by the processors to improve chip performance.

        Intel said the flaw was discovered by its internal researchers and partners, which was also reported by other researchers from other companies.

        The security flaw was the most recent revelation of Intel chip bugs since two notorious hardware viruses involving Intel processors, nicknamed Spectre and Meltdown, caused panic among computer users last year.

        Some security experts said the new chip bug could affect almost all computers powered by Intel chips dating back to 2011.

        Despite its potential threat, Intel said "there are no reports of any real-world exploits of these vulnerabilities" because the actual exploitation of MDS is very complex.

        The company noted that it has addressed the hardware problem in its processors, including a fix to its future processors, with microcode updates.

        Other tech companies such as Google, Amazon and Microsoft have also released security advisories on their respective websites to fix the problem on Tuesday.

        TOP STORIES
        EDITOR’S CHOICE
        MOST VIEWED
        EXPLORE XINHUANET
        010020070750000000000000011100001380602631
        主站蜘蛛池模板: 国产精品色一区二区三区| 一区二区韩国福利网站| 素人视频亚洲十一十二区| 成人午夜视频一区二区无码| 亚洲人成网站观看在线观看| 欧美精品人人做人人爱视频| 忘忧草在线观看日本| 亚洲精品二区在线播放| 国产亚洲精品一区在线播放| 激情综合色区网激情五月| 成人av午夜在线观看| 亚洲AV无码国产在丝袜APP| 亚洲国产精品成人无码区| 无码人妻精品一区二| 91福利国产午夜亚洲精品| 大尺度国产一区二区视频| 视频一区视频二区视频三| 久草热久草热线频97精品| 精品福利视频导航| 国产午夜福利视频合集| 高清激情文学亚洲一区| 日韩不卡一区二区在线观看| A级毛片100部免费看| 99国产精品永久免费视频| 综合亚洲网| 久久精品国产999大香线焦| 亚洲欧美综合人成在线| 黄色特级片一区二区三区| 亚洲中文字幕综合小综合| 亚洲欧美日本久久网站| 狠狠色综合久久狠狠色综合| 亚洲另类无码专区国内精品| 日韩欧美中文字幕在线精品| 东方av四虎在线观看| 亚洲国产精品福利片在线观看| 日本熟妇人妻一区二区三区| 扒开粉嫩的小缝隙喷白浆视频| 成全高清在线播放电视剧| 亚洲一区二区三区久久综合| 亚洲一区黄色| 亚洲高清最新AV网站|