首页
登录
职称英语
[originaltext]Security researchers have found serious vulnerabilities in chips
[originaltext]Security researchers have found serious vulnerabilities in chips
游客
2024-03-10
57
管理
问题
Security researchers have found serious vulnerabilities in chips made by Intel and other companies that, if exploited, could leave passwords and other sensitive data exposed.
The discovery comes shortly after the chipmaker said it was working on a patch.
In a statement released Wednesday, Intel acknowledged the problem, saying that it is “working closely with many other technology companies, including AMD, ARM Holdings and several operating system vendors, to develop an industry-wide approach to resolve this issue promptly and constructively. Intel has begun providing software and firmware updates to mitigate these exploits.”
According to The Associated Press: “Tech companies typically withhold details about security problems until fixes are available so that hackers wouldn’t have a roadmap to exploit the flaws. But in this case, Intel was forced to disclose the problem Wednesday after British technology site The Register reported it, causing Intel’s stock to fall.”
The Register reports that “Programmers are scrambling to overhaul the open-source Linux kernel’s virtual memory system. Meanwhile, Microsoft is expected to publicly introduce the necessary changes to its Windows operating system in an upcoming patch Tuesday: these changes were seeded to beta testers running fast-ring Windows Insider builds in November and December.”
The tech site added, “Crucially, these updates to both Linux and Windows will incur a performance hit on Intel products.”
However, that is a claim that Intel disputes. “Any performance impacts are workload-dependent, and, for the average computer user, should not be significant and will be mitigated over time,” the company says.
Questions 9 to 11 are based on the passage you have just heard.
9. What will happen if the bugs in chips are exploited?
10. What do tech companies typically do about security problems?
11. What does Intel say about the performance impacts of the updates?
选项
A、They will influence Intel products.
B、They are dependent on workload.
C、They are significant for computer users.
D、They will not be mitigated over time.
答案
B
解析
转载请注明原文地址:https://tihaiku.com/zcyy/3523105.html
相关试题推荐
[originaltext]W:Sohow’sourpresentationabouttherestructuringofthecompa
[originaltext]W:Sohow’sourpresentationabouttherestructuringofthecompa
[originaltext]W:Wow!IwouldgiveanythingtobemorelikeAudreyHepburn!M:
[originaltext]W:Wow!IwouldgiveanythingtobemorelikeAudreyHepburn!M:
[originaltext]M:Youareheadingforacompletelydifferentworldnowthatyou
[originaltext]M:Youareheadingforacompletelydifferentworldnowthatyou
[originaltext]W:Hi,mynameisKathy.Nicetomeetyou!M:Nicetomeetyou,t
[originaltext]W:Hi,mynameisKathy.Nicetomeetyou!M:Nicetomeetyou,t
[originaltext]M:Howdiditgoatthebankthismorning?W:Notwell.Mypropos
[originaltext]M:Howdiditgoatthebankthismorning?W:Notwell.Mypropos
随机试题
Oneofthemostinterestingofallstudiesisthestudyofwordsandwordor
Oneafternoonrecently,twounrelatedfriendscalledtotellmethat,well,
[img]2012q1/ct_eilm_eillist_0239_20121[/img][br]peertutor
Thereareseveralpossiblerelationshipsbetweenlanguageandsociety.Onei
图书再版的必要条件包括( )等。A.读者有相应需求 B.作者提出要求 C.
Selye提出了一般适应症候群的压力反应模式,他认为人面临压力的反应阶段不包括(
某社区年均人口为10万,年内共死亡150人,其中60岁以上死亡100人,在全部死
外部事件引发的操作风险包括()。A.外部欺诈盗窃 B.洗钱 C.内部欺诈
A.15天 B.25天 C.35天 D.45天
关于麻醉药品和精神药品邮寄管理的说法,正确的有A.邮寄证明一证一次有效 B.寄
最新回复
(
0
)