首页
登录
职称英语
[originaltext]Security researchers have found serious vulnerabilities in chips
[originaltext]Security researchers have found serious vulnerabilities in chips
游客
2023-08-08
38
管理
问题
Security researchers have found serious vulnerabilities in chips made by Intel and other companies that, if exploited, could leave passwords and other sensitive data exposed.
The discovery comes shortly after the chipmaker said it was working on a patch.
In a statement released Wednesday, Intel acknowledged the problem, saying that it is “working closely with many other technology companies, including AMD, ARM Holdings and several operating system vendors, to develop an industry-wide approach to resolve this issue promptly and constructively. Intel has begun providing software and firmware updates to mitigate these exploits.”
According to The Associated Press: “Tech companies typically withhold details about security problems until fixes are available so that hackers wouldn’t have a roadmap to exploit the flaws. But in this case, Intel was forced to disclose the problem Wednesday after British technology site The Register reported it, causing Intel’s stock to fall.”
The Register reports that “Programmers are scrambling to overhaul the open-source Linux kernel’s virtual memory system. Meanwhile, Microsoft is expected to publicly introduce the necessary changes to its Windows operating system in an upcoming patch Tuesday: these changes were seeded to beta testers running fast-ring Windows Insider builds in November and December.”
The tech site added, “Crucially, these updates to both Linux and Windows will incur a performance hit on Intel products.”
However, that is a claim that Intel disputes. “Any performance impacts are workload-dependent, and, for the average computer user, should not be significant and will be mitigated over time,” the company says.
Questions 9 to 11 are based on the passage you have just heard.
9. What will happen if the bugs in chips are exploited?
10. What do tech companies typically do about security problems?
11. What does Intel say about the performance impacts of the updates?
选项
A、Conceal details until fixes are available.
B、Develop an industry-wide approach.
C、Disclose details in the first place.
D、Provide replacement applications.
答案
A
解析
转载请注明原文地址:https://tihaiku.com/zcyy/2906844.html
相关试题推荐
[originaltext]Objectsthatarevibratingmakesounds.Rhythmicsoundvibrations
[originaltext]Objectsthatarevibratingmakesounds.Rhythmicsoundvibrations
[originaltext]Hi,everybody.AsIsaidinmyStateoftheUnionaddress,weliv
[originaltext]Hi,everybody.AsIsaidinmyStateoftheUnionaddress,weliv
[originaltext]Hi,everybody.AsIsaidinmyStateoftheUnionaddress,weliv
[originaltext]IntheUnitedStates,manypeopleoncelivedinlarge,two-and-th
[originaltext]IntheUnitedStates,manypeopleoncelivedinlarge,two-and-th
[originaltext]Easterisamixofthreetraditions:Pagan,HebrewandChristian.
[originaltext]Easterisamixofthreetraditions:Pagan,HebrewandChristian.
[originaltext]W:2millionhighschoolseniorsaregearingupthisfalltoappl
随机试题
—Canyoutellmewhathisinterestsare?Thatwaywecanmakesurehehasagood
[originaltext]M:Goodafternoon,ma’am.I’mMr.Smith.Icalledyoualittlewh
WhichofthefollowingsentencesisINCORRECT?A、Thestrikemaylastanotherthre
党的十八大提出创新驱动的发展战略,结合实际生活,谈谈你对此的认识和看法。
辅导员在开展评奖评优工作是应坚持的总体原则是()A.积极申报,鼓励先进 B.
右边四个图形中,只有一个是由左边的四个图形拼合(只能通过上、下、左、右平移)而成
我国古代教育家苟子说“蓬生麻中,不扶自直;白沙在涅,与之俱黑”,这强调的是( )
(2017年11月)管理人员教程培训的设计一般按照四个级别进行。其中,一级培训是
《刑法》第171条第1款规定:出售、购买伪造的货币或者明知是伪造的货币而运输,数
SDH微波传输设备不包括()。A.天馈线部分 B.中频调制解调部分 C.微
最新回复
(
0
)