<blockquote id="pl83f"><p id="pl83f"></p></blockquote>
<s id="pl83f"><li id="pl83f"></li></s>

      
      
      <sub id="pl83f"><rt id="pl83f"></rt></sub>

        <blockquote id="pl83f"><p id="pl83f"></p></blockquote>
        <sub id="pl83f"><rt id="pl83f"></rt></sub>
        女人的天堂av在线播放,3d动漫精品一区二区三区,伦精品一区二区三区视频,国产成人av在线影院无毒,亚洲成av人片天堂网老年人,最新国产精品剧情在线ss,视频一区无码中出在线,无码国产精品久久一区免费

        Intel discloses new security flaw in its chips

        Source: Xinhua| 2019-05-15 13:35:39|Editor: ZX
        Video PlayerClose

        SAN FRANCISCO, May 14 (Xinhua) -- Intel on Tuesday discloses a new security flaw in its processors that could allow potential attackers to steal sensitive data from Intel-powered computers or even cloud servers.

        The world's top chipmaker called the new group of vulnerabilities embedded in the architecture of computer hardware as Microarchitectural Data Sampling (MDS).

        "MDS is a sub-class of previously disclosed speculative execution side channel vulnerabilities and is comprised of four related techniques," said Intel.

        The security bug is capable of taking advantage of the vulnerabilities of Intel chips when a speculative execution is performed by the processors to improve chip performance.

        Intel said the flaw was discovered by its internal researchers and partners, which was also reported by other researchers from other companies.

        The security flaw was the most recent revelation of Intel chip bugs since two notorious hardware viruses involving Intel processors, nicknamed Spectre and Meltdown, caused panic among computer users last year.

        Some security experts said the new chip bug could affect almost all computers powered by Intel chips dating back to 2011.

        Despite its potential threat, Intel said "there are no reports of any real-world exploits of these vulnerabilities" because the actual exploitation of MDS is very complex.

        The company noted that it has addressed the hardware problem in its processors, including a fix to its future processors, with microcode updates.

        Other tech companies such as Google, Amazon and Microsoft have also released security advisories on their respective websites to fix the problem on Tuesday.

        TOP STORIES
        EDITOR’S CHOICE
        MOST VIEWED
        EXPLORE XINHUANET
        010020070750000000000000011100001380602631
        主站蜘蛛池模板: 囯产精品久久久久久久久久妞妞 | 免费国产午夜高清在线视频| 丁香五月亚洲综合深深爱 | 日韩av中文字幕有码| 成人午夜av在线播放| 熟妇人妻av无码一区二区三区| 国产乱人伦在线播放| 国产色无码专区在线观看| 中文字幕乱码免费人妻av| 日本丶国产丶欧美色综合| 天天躁日日躁狠狠躁中文字幕| 亚洲区1区3区4区中文字幕码| 精品日本免费一区二区三区| 狠狠做五月深爱婷婷伊人| 国产h视频免费观看| 你懂的视频在线一区二区| 亚洲福利精品一区二区三区| 亚洲国产香蕉视频欧美| 男人的天堂va在线无码| 岛国大片在线免费播放| 麻豆一区二区三区精品视频| 欧美成人一卡二卡三卡四卡 | 久久久无码精品亚洲日韩蜜臀浪潮| japanese边做边乳喷| √天堂中文在线最新版| 亚洲精品乱码久久久久久自慰| 国产精品一区二区在线欢| 免费无遮挡毛片中文字幕| 国产精品自拍视频免费看| 久久夜夜免费视频| 国产中文三级全黄| 亚洲中国精品精华液| 婷婷综合在线观看丁香| 久久精品国产亚洲精品2020| 亚洲一区二区黄色| av一区二区中文字幕| 67194熟妇在线观看线路| 自拍偷拍一区二区三区四| 一边亲着一面膜的免费版电视剧 | 国产精品自在拍在线播放| 亚洲少妇人妻无码视频|