Many Chinese companies have direct ties to the Chinese government, Walden said, which means the Chinese government may have known about the security vulnerabilities before the USA government or American companies - companies that may have been exposed to the security flaws. It is unlikely anything frightful has happened on a widespread basis because of this flaw and the playing field is now level again; however this remains a great example of how not to deal with the discovery of a major architectural flaw which continues to cause grave security concerns globally. As of January 25, there are no known reports to indicate that this Spectre variant 2 (CVE 2017-5715 ) has been used to attack customers.
Due to the severity of the flaws, Intel's decision to warn select customers in advance, leaving out the U.S. Government itself, has been met with concerns of the information being misused. "In our testing this new update has been found to prevent the behavior described", Microsoft said.
Path to citizenship for some 'dreamers,' if wall funded
John Cornyn, R-Texas, said. "I took our thing off - they took their thing off the table, I took our thing, we're starting over". Chris Coons of DE said an ultra-conservative plan from the White House "absolutely could" destabilize the bipartisan talks.
In other developments related to Spectre and Meltdown, which also affect many CPUs made by ARM and AMD, The Wall Street Journal reported yesterday that Intel's initial disclosures about the vulnerabilities were made to "a small group of customers, including Chinese technology companies, but left out the US government". The chip flaw actually isn't unique to Intel chips, though-it was also found in AMD, ARM, and other chip manufacturers' products, too. Codenamed Spectre and Meltdown, the flaw being inherent to the very design the chips incorporated rules out a quick and easy solution. This is being fixed but in the meantime, Microsoft has pushed out its own Windows patch that disables Intel's prior buggy fix. On Jan. 23, the Cupertino, Calif. device maker released a security update for macOS High Sierra 10.13.3 and OS X El Capitan 10.11.6, specifically addressing the Meltdown vulnerability. (That's the type of vulnerability that applies to Spectre and Meltdown.) That's KB4073119, and it outlines PowerShell scripts to check vulnerability protections, and registry tweaks to enable or disable them.
Apple also issued updates across its various operating systems, including macOS, iOS and tvOS.
Intel spokesperson stated Google Project Zero team and other tech vendors such as Intel usually follow the best practices in the industry of responsible and coordinated disclosure.
- Congress president Rahul Gandhi approves 70-member campaign committee for Karnataka
- Latest iOS update goes live, is HomePod ready
- Om Prakash Rawat appointed as new Chief Election Commissioner
- "Black Panther" stars tout its diversity and example at LA premiere
- North Atlantic Treaty Organisation chief says Turkey has right to defend itself amid Syria campaign
- Prepare for a rare celestial trifecta: Super Blue Blood Moon
- Original Range Rover Sets Template for High-Zoot SV Coupe
- Instagram Adds GIF Stickers into Stories with GIPHY Support
- Boeing loses Bombardier anti-dumping case
- California siblings 'starved, shackled, taunted with food'