To this end, the entire technology industry is competing to develop software patches that can repair these vulnerabilities. All the big tech companies, including apple, Amazon, Microsoft and Google, are using the operating system for it andCloud serviceUpdate the patch.
So how do companies respond to this chip bug event?
"Intel and other technology companies have learned from new security studies that when software analysis methods are used for malicious purposes, it is possible to collect sensitive data from computer devices improperly. Intel believes that these vulnerabilities do not have the possibility of destroying, modifying and deleting data. "
"Recent reports about these vulnerabilities are wrong by a bug or flaw that exists only in Intel products. Based on the analysis so far, many computing device types, including processors and operating systems from many different manufacturers, are very vulnerable to such attacks.
Microsoft has updated Windows 10 today, while both Windows 7 and Windows 8 have been updated.
"We are aware of the problems that happen throughout the industry and have been working closely with chipmakers to develop and test mitigation measures to protect our customers. We are deploying mitigation measures for cloud services, and we have also released a security upgrade for Windows customers that can protect Intel, ARM, and AMD hardware vulnerabilities. We haven't received any reports that our customers have been attacked by these vulnerabilities. "
Researchers at Google Project Zero actually discovered these vulnerabilities as early as last year and provided Intel, AMD, and ARM in June 2017. In a blog article, Google disclosed its measures for Android, Crhome OS, and Google Cloud. The company said that both Chromecast and Chrome browsers were not in the scope of the impact.
"This is a loophole that has already existed for more than 20 years in a modern processor architecture such as Intel, AMD, ARM and so on.The serverDesktop, mobile equipment. Only a few of the Amazon EC2 fleet are now protected, but the rest of the protection work will be completed in the next few hours. We will keep our customers aware of the latest developments of our safety notices at any time.HereFind it. "
"It needs to be clarified that the security research team has identified 3 variants for the prediction execution. The 3 variants have different threats and effects on each microprocessor company, and AMD is not affected. Because of the differences in the AMD architecture, we believe that the AMD processor is currently at zero risk. We expect the security research report to be published later today and will provide further information at that time. "
"ARM has collaborated with Intel and AMD to solve the bypass analysis method of speculative execution technology using some high-end processors, including our Coretex-A processor. This method allows malware to run locally and then access privileges from the privileged memory data. It is important to note that our popular low power, IoT device connected Cortex-M processors are not in the scope of the impact. "
"We recommend our Silicon Valley partners, if their chips are affected, it is best to take mitigation measures."
Until now, the company has not responded.