Select date

May 2024
Mon Tue Wed Thu Fri Sat Sun

Report: Intel Chips May Have A Big Security Flaw Slowing Down Computers Everywhere

3-1-2018 < The Daily Sheeple 88 305 words
 

2000px-Intel-logo.svg


Almost every one of Intel’s computer processors produced in the last 10 years could be highly vulnerable to hacking due to a major security flaw, the Register reported Tuesday evening.


An apparent design error in most modern Intel processors means that malicious programs could be able to read once-protected parts of a electronic device’s memory. In other words, highly personal information and data like passwords could easily be exposed and stolen.


In order to fix the problem, developers must add patches to the device’s system hardware by creating updates, according to The Register. But the updates may slow down the computing speeds anywhere from five to 30 percent, “depending on the task and the processor model.”


News of the processor flaw sent the stock of Advanced Micro Devices (AMD) Inc. soaring in early morning trading Wednesday after a substantial uptick overnight.


Though Intel shares rose 27 percent in 2017, and AMD’s stock fell 9 percent in the same timespan, according to CNBC, the latest report of security vulnerability could shift the competitive landscape in the industry.


In general, The Register’s report of Intel’s problems could have wide-ranging effects, like if government systems have been (or are) vulnerable to foreign espionage or cyberattacks.


Also, Intel’s struggles could potentially hurt America in its unofficial race to widespread 5G technology installment.


Delivered by The Daily Sheeple


We encourage you to share and republish our reports, analyses, breaking news and videos (Click for details).



Contributed by Eric Lieberman of The Daily Caller News Foundation.


Content created by The Daily Caller News Foundation is available
without charge to any eligible news publisher that can provide a large audience. For
licensing opportunities of our original content, please contact
[email protected].



Print