Intel said researchers from "Apple, Amazon, Google and Microsoft are among those reporting that they are seeing little to no performance impact" after installing security updates. The computing industry is scrambling to lessen the severity of the problem with updates to operating systems, web browsers, cloud-computing services and other foundations that need to be kept secure.
The world awoke today to a terrifying reality that virtually all phones and computers in the world are potentially at risk because of security vulnerabilities that exist on chips manufactured in the last 10 years. By the end of next week, Intel expects to have issued updates for more than 90 percent of processor products introduced within the past five years.
AMD will likely try to take advantage of this controversy. So all devices from computers to smartphones to tablets are impacted by the flaws. Microsoft and Linux Foundation are working on patches to fix the vulnerabilities while Apple has yet to make a statement on the matter.
On Thursday, Intel's stock closed down 1.8 percent to $44.43 a share. It closed down $1.59, or 3.4%, to $45.26.Some on Wall Street think that Intel's loss could mean gains for rivals: AMD and Nvidia could use it as a marketing edge. Unfortunately, this involves reducing the overall performance of the operating system. We invite you to install this emergency update as soon as possible, though Microsoft explained yesterday that some versions of anti-virus software may block the installation of the patch. Intel on its part has helped to provide security patches, but the complaints raise concerns that these patches will hurt their computer performance, and aren't the proper solution needed to help resolve the issues. Much debate now seems set to ensue as to what degree which processors are affected and how much they are hobbled in performance by the resulting software burden.
Computer security researchers recently disclosed two security flaws named Meltdown and Spectre that affects devices using processors from Intel, AMD and ARM Holdings. For example, an unauthorized party may read sensitive information in the system's memory such as passwords, encryption keys, or sensitive information open in applications.
The two hardware bugs discovered can be exploited to allow the memory content of a computer to be leaked.
The problem is to do with the design architecture used in the manufacture of computer chips, which has been used for decades.