<blockquote id="pl83f"><p id="pl83f"></p></blockquote>
<s id="pl83f"><li id="pl83f"></li></s>

      
      
      <sub id="pl83f"><rt id="pl83f"></rt></sub>

        <blockquote id="pl83f"><p id="pl83f"></p></blockquote>
        <sub id="pl83f"><rt id="pl83f"></rt></sub>
        女人的天堂av在线播放,3d动漫精品一区二区三区,伦精品一区二区三区视频,国产成人av在线影院无毒,亚洲成av人片天堂网老年人,最新国产精品剧情在线ss,视频一区无码中出在线,无码国产精品久久一区免费

        Intel discloses new security flaw in its chips

        Source: Xinhua| 2019-05-15 13:35:39|Editor: ZX
        Video PlayerClose

        SAN FRANCISCO, May 14 (Xinhua) -- Intel on Tuesday discloses a new security flaw in its processors that could allow potential attackers to steal sensitive data from Intel-powered computers or even cloud servers.

        The world's top chipmaker called the new group of vulnerabilities embedded in the architecture of computer hardware as Microarchitectural Data Sampling (MDS).

        "MDS is a sub-class of previously disclosed speculative execution side channel vulnerabilities and is comprised of four related techniques," said Intel.

        The security bug is capable of taking advantage of the vulnerabilities of Intel chips when a speculative execution is performed by the processors to improve chip performance.

        Intel said the flaw was discovered by its internal researchers and partners, which was also reported by other researchers from other companies.

        The security flaw was the most recent revelation of Intel chip bugs since two notorious hardware viruses involving Intel processors, nicknamed Spectre and Meltdown, caused panic among computer users last year.

        Some security experts said the new chip bug could affect almost all computers powered by Intel chips dating back to 2011.

        Despite its potential threat, Intel said "there are no reports of any real-world exploits of these vulnerabilities" because the actual exploitation of MDS is very complex.

        The company noted that it has addressed the hardware problem in its processors, including a fix to its future processors, with microcode updates.

        Other tech companies such as Google, Amazon and Microsoft have also released security advisories on their respective websites to fix the problem on Tuesday.

        TOP STORIES
        EDITOR’S CHOICE
        MOST VIEWED
        EXPLORE XINHUANET
        010020070750000000000000011100001380602631
        主站蜘蛛池模板: 成人午夜视频在线| 久久久久波多野结衣高潮| 国产仑乱无码内谢| 日本精品极品视频在线| 亚洲欧美日韩综合久久| 永久免费AV无码国产网站| 天堂va蜜桃一区二区三区| 国产成人不卡一区二区| 国产成人综合久久二区| 国内自拍第一区二区三区| 欧美大bbbb流白水| 日本亚洲色大成网站www久久| 国产69精品久久久久久妇女迅雷| 免费观看全黄做爰的视频| 国产成人午夜精品福利| 亚洲国产免费公开在线视频| 无码人妻精品一区二区三区下载| 精品国产一区二区三区2021| 国模无吗一区二区二区视频 | 日韩高清国产中文字幕| 日韩精品a片一区二区三区妖精| 精品自拍自产一区二区三区| 亚洲中文字幕av天堂| 麻豆精品在线| 亚洲欧洲自拍拍偷午夜色| 饥渴的熟妇张开腿呻吟视频| 国产综合色产在线精品| 日韩三级手机在线观看不卡| 亚洲国产日韩一区三区| 黄色A级国产免费大片视频| 国产精品大全中文字幕| 亚洲精品国产三级在线观看| 在线日韩日本国产亚洲| 精品夜夜澡人妻无码av| 亚洲国产精品男人的天堂| 亚洲AV无码成人精品区| 亚洲黄色片一区二区三区| 亚洲日韩中文字幕在线播放| 自拍第一区视频在线观看| 免费激情网址| 国产91丝袜在线播放动漫|