<blockquote id="pl83f"><p id="pl83f"></p></blockquote>
<s id="pl83f"><li id="pl83f"></li></s>

      
      
      <sub id="pl83f"><rt id="pl83f"></rt></sub>

        <blockquote id="pl83f"><p id="pl83f"></p></blockquote>
        <sub id="pl83f"><rt id="pl83f"></rt></sub>
        女人的天堂av在线播放,3d动漫精品一区二区三区,伦精品一区二区三区视频,国产成人av在线影院无毒,亚洲成av人片天堂网老年人,最新国产精品剧情在线ss,视频一区无码中出在线,无码国产精品久久一区免费

        Intel discloses new security flaw in its chips

        Source: Xinhua| 2019-05-15 13:35:39|Editor: ZX
        Video PlayerClose

        SAN FRANCISCO, May 14 (Xinhua) -- Intel on Tuesday discloses a new security flaw in its processors that could allow potential attackers to steal sensitive data from Intel-powered computers or even cloud servers.

        The world's top chipmaker called the new group of vulnerabilities embedded in the architecture of computer hardware as Microarchitectural Data Sampling (MDS).

        "MDS is a sub-class of previously disclosed speculative execution side channel vulnerabilities and is comprised of four related techniques," said Intel.

        The security bug is capable of taking advantage of the vulnerabilities of Intel chips when a speculative execution is performed by the processors to improve chip performance.

        Intel said the flaw was discovered by its internal researchers and partners, which was also reported by other researchers from other companies.

        The security flaw was the most recent revelation of Intel chip bugs since two notorious hardware viruses involving Intel processors, nicknamed Spectre and Meltdown, caused panic among computer users last year.

        Some security experts said the new chip bug could affect almost all computers powered by Intel chips dating back to 2011.

        Despite its potential threat, Intel said "there are no reports of any real-world exploits of these vulnerabilities" because the actual exploitation of MDS is very complex.

        The company noted that it has addressed the hardware problem in its processors, including a fix to its future processors, with microcode updates.

        Other tech companies such as Google, Amazon and Microsoft have also released security advisories on their respective websites to fix the problem on Tuesday.

        TOP STORIES
        EDITOR’S CHOICE
        MOST VIEWED
        EXPLORE XINHUANET
        010020070750000000000000011100001380602631
        主站蜘蛛池模板: 亚洲天堂av 在线| 日韩成人大屁股内射喷水| 亚洲国产欧美另类va在线观看| 亚洲另类激情专区小说图片| 真实国产老熟女无套中出| 91精品亚洲一区二区三区| 精品尤物国产尤物在线看| 国产欧美日韩亚洲一区二区三区| 插插射啊爱视频日a级| 欧美亚洲国产精品久久蜜芽直播| 国产精品福利网红主播| 久久久精品94久久精品| 国产精品国产精品国产专区 | 蜜桃一区二区三区在线看| 久久国产精品第一区二区| 综合偷自拍亚洲乱中文字幕| 日韩中文免费一区二区| 免费精品国产人妻国语色戒| y1111111少妇无码| 中文字幕午夜福利片午夜福利片97| 日本高清中文字幕免费一区二区| 亚洲欧美日韩国产精品专区| 少妇爽到爆视频网站免费| 日本理伦一区二区三区| 日韩国产成人精品视频| 午夜无码区在线观看亚洲| 国产欧美精品一区aⅴ影院| 国产精品自产拍在线播放| 丁香婷婷色综合激情五月| 麻豆精产国品一二三产| 国产精品福利无圣光一区二区| 亚洲国产精品成人av网| 蜜芽久久人人超碰爱香蕉| 国产欧亚州美日韩综合区| 久久被窝亚洲精品爽爽爽 | 日韩精品一区二区三区日韩 | 精品一区二区免费不卡| 99精品伊人久久久大香线蕉| 精品偷自拍另类在线观看| 亚洲国产综合专区在线播放| 视频一区二区三区在线视频|