![]() ![]() Tech Enabled: CNET chronicles tech's role in providing new kinds of accessibility. It's Complicated: This is dating in the age of apps. Update, 2:21 p.m.: Adds comment from Intel. On March 5, 2020, computer security experts reported another Intel chip security flaw, besides the Meltdown and Spectre flaws, with the systematic name. We are actively engaging with the Linux community, including Linus, as we seek to work together on solutions." ![]() In response to Torvald's remarks, Intel said in a statement, "We take the feedback of industry partners seriously. "I think we need something better than this garbage," he wrote. On Sunday, Linus Torvalds, an influential software developer known for creating Linux, which underpins systems like Android and Chrome OS, repeatedly called the Meltdown updates "garbage" in a message on Sunday. The disclosure of Spectre and Meltdown opened a floodgates of sorts, what with endless variants of the attacks coming to light in the intervening years, even as chipmakers like Intel, ARM, and AMD have continually scrambled to incorporate defenses to alleviate the vulnerabilities that permit malicious code to read passwords, encryption keys, and other valuable information directly from a. The company said Thursday newer chip models called Ivy Bridge, Sandy Bridge, Kaby Lake and Skylake are also affected. Were causing problems after receiving updates. Intel first acknowledged the problem more than a week ago, saying chips in the company's lines called Broadwell and "We continue to urge all customers to vigilantly maintain security best practice and for consumers to keep systems up-to-date," Shenoy said. For more information on how to update a PC with a vulnerable chip, see CNET's guide on keeping Windows computers safe from Meltdown. To learn what updates you might need, see CNET's list of Spectre and Meltdown updates. That's because manufacturers deliver the Spectre and Meltdown updates to the chips through a different program. Security researchers last week disclosed flaws, dubbed Meltdown and Spectre, that could allow hackers to steal passwords or encryption keys on most types of computers, phones, and cloud-based servers. The announcement doesn't mean regular computer users should turn off automatic updates, like Windows Update. ![]() The flaws make it possible for hackers to access sensitive information, including passwords and encryption keys, from a chip's memory. For now, leaving processors unpatched means chips still have the Spectre and Meltdown design flaws. Shenoy said Monday the company has figured out why the patch is causing unexpected reboots for some of the affected chips, and it will use that information to release an updated patch in the future. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |