The executives clarified, however, that the performance impact will be negligible when it comes to average PC users. According to the original report from The Register, the fix for the security vulnerability could make the PCs slower.
"Intel believes its products are the most secure in the world and that, with the support of its partners, the current solutions to this issue provide the best possible security for its customers".
Intel also said that the vulnerability is not unique to their products. The security flaw is more likely to be found in various gadgets of all big players including Apple, Lenovo, HP, and Dell, which relies upon Intel's processors in their devices.
Google on its blog said that Intel and the others planned to disclose the issues on Jan 9, but were forced to do so early after the problems became public. Security researchers warn that the industry is in a race against time before hackers figure out how to exploit the vulnerabilities. The isolation of the kernel memory on the computer will create significant slowdowns of the processes and will impact the performance. When the news leaked, Google, Intel and other interested parties decided to release the information to end speculation. This is a standard practice for security flaws in order to prevent hackers from exploiting it.Читайте также: Lewandowski says bombshell book 'filled with lies — WMUR first
Intel processors in the last two decades are almost all affected by the fundamental mechanism used in the operation of the exploit, while only a some of AMD's processors are affected.
Currently there is no fix for Spectre as it is much harder to fix, and the anonymous researchers said it could "haunt us" for quite some time to come.
"Programmers are scrambling to overhaul the open-source Linux kernel's virtual memory system".
HACKERS could steal information from millions of desktop computers, laptops, or even tablet computers thanks to unprecedented security flaws discovered in computer chips dating back to 1995, it has been revealed.
The problem stems from the "speculative execution" of code, where the processor attempts to guess at what task will need to be done next.При любом использовании материалов сайта и дочерних проектов, гиперссылка на обязательна.
«» 2007 - 2018 Copyright.
Автоматизированное извлечение информации сайта запрещено.
Код для вставки в блог