Intel tentou comprar o silêncio de pesquisadores que descobriram vulnerabilidades MDS

Uma das novidades mais ressonante dos últimos dias é a descoberta de uma nova classe de vulnerabilidade em MDS (Amostragem microarquitetura de dados).

Eut is peculiar that owners of PCs, equipado com competindo com processadores AMD Inter, estão fora de risco; produtor confirmou que seu produto não é afetado por novas vulnerabilidades.

Leia sobre isso em nosso artigo: Zombieload e companhia: pesquisador descobriu nova classe de vulnerabilidades em processadores Intel

Concerning Intel, it seems like experts were mistaken when thought that after story with Fusão e Spectre vulnerabilities they cannot be surprised. New scandal continues to gain momentum and recently was investigated that Intel allegedly tried to get more time and buy silence of researchers from Amsterdam Universidade Livre that found new vulnerabilities in Intel processors.

“Intel offered to pay the researchers a $40,000rewardto allegedly get them to downplay the severity of the vulnerability, and backed their offer with an additional $80,000. The team politely refused both offers”, — Dutch publication Nieuwe Rotterdamsche Courant reports.

The case is obligatory condition of remuneration payments in Intel is signing standard non-disclosure agreement on confidential information. assim, if proposition is accepted, researchers oblige to be silent about vulnerabilities and discussing this top-secret information with the narrow circle of authorized employees.

In Intel explain such approach by the necessity of allocating time on investigation of issues and development of respective patches while disclosing of data prior to these interventions increases risk that attackers will use gaps before than they will be closed.

Researchers allegedly were not satisfied by this variant and they decided to refuse from reward to be able to share information about vulnerabilities and related risks with the public.

And here it all fits: updates of processors’ microcodes and relevant patches from vulnerabilities for different software just started to deploy for susceptible devices to a new class.

Fonte: https://www.techpowerup.com

Sobre Trojan Killer

Carry Trojan Killer portátil em seu memory stick. Certifique-se que você é capaz de ajudar o seu PC resistir a quaisquer ameaças cibernéticas onde quer que vá.

Além disso, verifique

MageCart na Cloud Platform Heroku

Os investigadores encontraram vários MageCart Web Skimmers Em Heroku Cloud Platform

Pesquisadores da Malwarebytes informou sobre encontrar vários skimmers MageCart web na plataforma Heroku nuvem …

Android Spyware CallerSpy

máscaras spyware CallerSpy como uma aplicação de chat Android

Trend Micro especialistas descobriram a CallerSpy malwares, que mascara como uma aplicação de chat Android, …

Deixe uma resposta