» 뉴스 » 인텔은 MDS 취약점을 발견 한 연구자의 침묵을 구입하려고

인텔은 MDS 취약점을 발견 한 연구자의 침묵을 구입하려고

One of the most resonant news of the last days is discovery of new vulnerability class on MDS (마이크로 아키텍처 데이터 샘플링).

나는t is peculiar that owners of PCs, equipped with competing with Inter AMD processors, are out of risk; producer confirmed that his product is not affected by new vulnerabilities.

Read about this in our article: Zombieload 및 회사: 연구원은 인텔 프로세서의 취약점의 새로운 클래스를 발견

Concerning Intel, it seems like experts were mistaken when thought that after story with 붕괴Spectre vulnerabilities they cannot be surprised. New scandal continues to gain momentum and recently was investigated that Intel allegedly tried to get more time and buy silence of researchers from 암스테르담 자유 대학 that found new vulnerabilities in Intel processors.

“Intel offered to pay the researchers a $40,000rewardto allegedly get them to downplay the severity of the vulnerability, and backed their offer with an additional $80,000. The team politely refused both offers”, — Dutch publication Nieuwe Rotterdamsche Courant reports.

The case is obligatory condition of remuneration payments in Intel is signing standard non-disclosure agreement on confidential information. 그래서, if proposition is accepted, researchers oblige to be silent about vulnerabilities and discussing this top-secret information with the narrow circle of authorized employees.

In Intel explain such approach by the necessity of allocating time on investigation of issues and development of respective patches while disclosing of data prior to these interventions increases risk that attackers will use gaps before than they will be closed.

Researchers allegedly were not satisfied by this variant and they decided to refuse from reward to be able to share information about vulnerabilities and related risks with the public.

독서  공격자는 적극적으로 이전에 오라클 웹 로직에서 취약점을 발견 악용

And here it all fits: updates of processors’ microcodes and relevant patches from vulnerabilities for different software just started to deploy for susceptible devices to a new class.

출처: https://www.techpowerup.com

[합계: 0    평균: 0/5]

트로이 킬러 소개

메모리 스틱에 트로이 킬러 휴대용 운반. 당신은 당신이 어디를 가든 당신의 PC가 어떤 사이버 위협에 저항 도울 수 있는지 확인하십시오.

또한 확인

GitHub의는 CVE을 할당 할 수 있습니다

GitHub의 지금 취약점에 CVE 식별자를 할당 할 수 있습니다

이번 주, GitHub의 대표는 바로 혁신의 수를 발표했다, 사실이 포함 …

Smominru 봇넷은 빨리 빨리 퍼짐

Smominru 봇넷 빠르게 확산 이상 해킹 90 천 컴퓨터 매월

암호 화폐 마이닝 및 신원 도용 봇넷 Smominru (또한 Ismo로 알려진) 믿을 수 없을 정도로 확산하기 시작했다 …

회신을 남겨주