SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : AMD, ARMH, INTC, NVDA
AMD 259.65+2.3%3:59 PM EST

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: Vattila who wrote (35670)3/7/2020 11:39:49 AM
From: neolibRead Replies (1) of 73985
 
This will give us all some head scratching for Monday:

I wonder if Intel Capital has been funding "Reserch"

zdnet.com


The Collide+Probe and Load+Reload are not that kind of attack, at least, according to researchers. These attacks can be exploited in real-world scenarios, and with rather ease, without needing physical access, special equipment, or to break apart computer cases to connect to hidden ports -- like many past CPU attacks have required.

The research team said it managed to exploit the two AMD vulnerabilities via JavaScript and in a cloud computing environment -- making the two attacks a palpable danger for real-world deployments of AMD processors.
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext