<blockquote id="pl83f"><p id="pl83f"></p></blockquote>
<s id="pl83f"><li id="pl83f"></li></s>

      
      
      <sub id="pl83f"><rt id="pl83f"></rt></sub>

        <blockquote id="pl83f"><p id="pl83f"></p></blockquote>
        <sub id="pl83f"><rt id="pl83f"></rt></sub>
        女人的天堂av在线播放,3d动漫精品一区二区三区,伦精品一区二区三区视频,国产成人av在线影院无毒,亚洲成av人片天堂网老年人,最新国产精品剧情在线ss,视频一区无码中出在线,无码国产精品久久一区免费

        Intel discloses new security flaw in its chips

        Source: Xinhua| 2019-05-15 13:35:39|Editor: ZX
        Video PlayerClose

        SAN FRANCISCO, May 14 (Xinhua) -- Intel on Tuesday discloses a new security flaw in its processors that could allow potential attackers to steal sensitive data from Intel-powered computers or even cloud servers.

        The world's top chipmaker called the new group of vulnerabilities embedded in the architecture of computer hardware as Microarchitectural Data Sampling (MDS).

        "MDS is a sub-class of previously disclosed speculative execution side channel vulnerabilities and is comprised of four related techniques," said Intel.

        The security bug is capable of taking advantage of the vulnerabilities of Intel chips when a speculative execution is performed by the processors to improve chip performance.

        Intel said the flaw was discovered by its internal researchers and partners, which was also reported by other researchers from other companies.

        The security flaw was the most recent revelation of Intel chip bugs since two notorious hardware viruses involving Intel processors, nicknamed Spectre and Meltdown, caused panic among computer users last year.

        Some security experts said the new chip bug could affect almost all computers powered by Intel chips dating back to 2011.

        Despite its potential threat, Intel said "there are no reports of any real-world exploits of these vulnerabilities" because the actual exploitation of MDS is very complex.

        The company noted that it has addressed the hardware problem in its processors, including a fix to its future processors, with microcode updates.

        Other tech companies such as Google, Amazon and Microsoft have also released security advisories on their respective websites to fix the problem on Tuesday.

        TOP STORIES
        EDITOR’S CHOICE
        MOST VIEWED
        EXPLORE XINHUANET
        010020070750000000000000011100001380602631
        主站蜘蛛池模板: 377P欧洲日本亚洲大胆| 日韩 一区二区在线观看| 国产精品一线二线三线区| 国产成人精品亚洲精品日日| 久久久综合九色合综| 亚洲精品天堂一区二区| 邻居少妇张开腿让我爽了在线观看| 亚洲av免费成人精品区| 欧美乱妇xxxxxbbbbb| 日韩美女亚洲性一区二区| 日本视频一两二两三区| 国产一区二区三区色噜噜| 宅男久久精品国产亚洲av麻豆| 又爆又大又粗又硬又黄的a片| 日韩在线视频线观看一区| 粉嫩虎白女p虎白女在线| 四虎在线中文字幕一区| 福利视频一区福利二区| 亚洲一区二区三区日本久久| 亚洲大尺度无码无码专线| 在线观看人成视频免费| 国产精品久久久久久无毒不卡| 国产精品白浆在线观看免费| 成人影片麻豆国产影片免费观看| 无码国产精品免费看| 亚洲人成网网址在线看| 亚洲精品中文字幕无乱码| 国产成人午夜福利精品| 亚洲va无码专区国产乱码| 日韩有码中文字幕av| 国产三级自拍视频在线| 亚洲av成人无码天堂| 欧洲美女粗暴牲交免费观看| caoporn成人免费公开| 久久久美女| 欧美成人精品手机在线| 久久国产V一级毛多内射| 欧美日韩精品一区二区视频| аv天堂最新中文在线| 无套内射视频囯产| 欧洲美女熟乱av|