<blockquote id="pl83f"><p id="pl83f"></p></blockquote>
<s id="pl83f"><li id="pl83f"></li></s>

      
      
      <sub id="pl83f"><rt id="pl83f"></rt></sub>

        <blockquote id="pl83f"><p id="pl83f"></p></blockquote>
        <sub id="pl83f"><rt id="pl83f"></rt></sub>
        女人的天堂av在线播放,3d动漫精品一区二区三区,伦精品一区二区三区视频,国产成人av在线影院无毒,亚洲成av人片天堂网老年人,最新国产精品剧情在线ss,视频一区无码中出在线,无码国产精品久久一区免费

        Intel discloses new security flaw in its chips

        Source: Xinhua| 2019-05-15 13:35:39|Editor: ZX
        Video PlayerClose

        SAN FRANCISCO, May 14 (Xinhua) -- Intel on Tuesday discloses a new security flaw in its processors that could allow potential attackers to steal sensitive data from Intel-powered computers or even cloud servers.

        The world's top chipmaker called the new group of vulnerabilities embedded in the architecture of computer hardware as Microarchitectural Data Sampling (MDS).

        "MDS is a sub-class of previously disclosed speculative execution side channel vulnerabilities and is comprised of four related techniques," said Intel.

        The security bug is capable of taking advantage of the vulnerabilities of Intel chips when a speculative execution is performed by the processors to improve chip performance.

        Intel said the flaw was discovered by its internal researchers and partners, which was also reported by other researchers from other companies.

        The security flaw was the most recent revelation of Intel chip bugs since two notorious hardware viruses involving Intel processors, nicknamed Spectre and Meltdown, caused panic among computer users last year.

        Some security experts said the new chip bug could affect almost all computers powered by Intel chips dating back to 2011.

        Despite its potential threat, Intel said "there are no reports of any real-world exploits of these vulnerabilities" because the actual exploitation of MDS is very complex.

        The company noted that it has addressed the hardware problem in its processors, including a fix to its future processors, with microcode updates.

        Other tech companies such as Google, Amazon and Microsoft have also released security advisories on their respective websites to fix the problem on Tuesday.

        TOP STORIES
        EDITOR’S CHOICE
        MOST VIEWED
        EXPLORE XINHUANET
        010020070750000000000000011100001380602631
        主站蜘蛛池模板: 国产一区二区三区不卡在线看| 欧美产精品一线二线三线| 亚洲综合小综合中文字幕| 国产超碰无码最新上传| 亚洲无码精品视频| 亚洲中文字幕成人综合网| 亚洲超清无码制服丝袜无广告| 日韩人妻无码一区二区三区99| 日本激情久久精品人妻热| 日韩一区二区三区在线视频| 亚洲日韩中文字幕在线播放| 一区二区丝袜美腿视频| 九九热99精品视频在线| 久9视频这里只有精品试看| 日韩欧美精品suv| 另类国产ts人妖合集| 少妇高潮惨叫久久久久电影| 亚洲国产精品老熟女乱码| 日韩国产中文字幕精品| 亚洲日本精品一区二区| 亚洲人成在久久综合网站| 综合亚洲网| 亚洲AV综合色区无码一区| 亚洲一区二区日韩综合久久| 老太脱裤让老头玩ⅹxxxx| 四虎永久在线精品无码视频| 亚洲日韩图片专区第1页| 欧美视频免费一区二区三区| 亚洲色欲色欲WWW在线丝| 亚洲伊人情人综合网站| 老司机午夜精品视频资源| 国产肥白大熟妇bbbb视频| 无码日韩精品一区二区三区免费 | 亚洲成人av在线资源| 一本大道久久精品 东京热| 中文字幕乱码一区二区免费| 日本55丰满熟妇厨房伦| 久久99国产精品尤物| 国产免费又色又爽又黄软件| 久久夜色精品久久噜噜亚| 国产亚洲无线码一区二区|