首页
登录
职称英语
[originaltext]Security researchers have found serious vulnerabilities in chips
[originaltext]Security researchers have found serious vulnerabilities in chips
游客
2024-03-10
73
管理
问题
Security researchers have found serious vulnerabilities in chips made by Intel and other companies that, if exploited, could leave passwords and other sensitive data exposed.
The discovery comes shortly after the chipmaker said it was working on a patch.
In a statement released Wednesday, Intel acknowledged the problem, saying that it is “working closely with many other technology companies, including AMD, ARM Holdings and several operating system vendors, to develop an industry-wide approach to resolve this issue promptly and constructively. Intel has begun providing software and firmware updates to mitigate these exploits.”
According to The Associated Press: “Tech companies typically withhold details about security problems until fixes are available so that hackers wouldn’t have a roadmap to exploit the flaws. But in this case, Intel was forced to disclose the problem Wednesday after British technology site The Register reported it, causing Intel’s stock to fall.”
The Register reports that “Programmers are scrambling to overhaul the open-source Linux kernel’s virtual memory system. Meanwhile, Microsoft is expected to publicly introduce the necessary changes to its Windows operating system in an upcoming patch Tuesday: these changes were seeded to beta testers running fast-ring Windows Insider builds in November and December.”
The tech site added, “Crucially, these updates to both Linux and Windows will incur a performance hit on Intel products.”
However, that is a claim that Intel disputes. “Any performance impacts are workload-dependent, and, for the average computer user, should not be significant and will be mitigated over time,” the company says.
Questions 9 to 11 are based on the passage you have just heard.
9. What will happen if the bugs in chips are exploited?
10. What do tech companies typically do about security problems?
11. What does Intel say about the performance impacts of the updates?
选项
A、Operating systems will crash.
B、Computer networks will be attacked.
C、Applications will be damaged.
D、Sensitive information will be exposed.
答案
D
解析
转载请注明原文地址:http://tihaiku.com/zcyy/3523103.html
相关试题推荐
[originaltext]W:Sohow’sourpresentationabouttherestructuringofthecompa
[originaltext]W:Sohow’sourpresentationabouttherestructuringofthecompa
[originaltext]W:Sohow’sourpresentationabouttherestructuringofthecompa
[originaltext]M:Youareheadingforacompletelydifferentworldnowthatyou
[originaltext]W:Hi,mynameisKathy.Nicetomeetyou!M:Nicetomeetyou,t
[originaltext]W:Hi,mynameisKathy.Nicetomeetyou!M:Nicetomeetyou,t
[originaltext]W:Hi,mynameisKathy.Nicetomeetyou!M:Nicetomeetyou,t
[originaltext]M:Howdiditgoatthebankthismorning?W:Notwell.Mypropos
[originaltext]M:Howdiditgoatthebankthismorning?W:Notwell.Mypropos
[originaltext]M:Howdiditgoatthebankthismorning?W:Notwell.Mypropos
随机试题
[originaltext]Atypicallargesupermarketoffersaround17,000to20,000it
A——airtrafficcontrolsystem B——armedpolice C——crimeprevention
单位工程施工组织设计应由项目技术负责人或技术负责人授权的技术人员审批,施工方案应
以下关于Ⅰ型超敏反应的描述,正确的是:()A.主要由补体系统参与反应 B
患者女性,16岁,患白血病,长期用抗生素,护士在口腔评估的过程中,应特别注意观察
目前,在我国允许以合伙企业的形式申请基金销售业务资格的是()A:证券公司B:证
某储户2014年3月5日存入存本取息定期储蓄存款10万元,存期1年,约定4个月取
(2018年真题)根据会计法律制度的规定,对于变造、伪造会计凭证,下列说法中正确
下列各项中,一般采用数量金额式账簿的是()。A.库存商品明细账 B.短期借
竣工付款申请单的内容不包括()。A.竣工结算合同总价 B.发包人已支付承包人
最新回复
(
0
)