AMD: Processor exploit is 'near-zero' risk to its chips

Intel CEO Brian Krzanich

Intel CEO Brian Krzanich

A report from The Register has surfaced which claims that the security flaw has been determined in the fundamental design of the chips.

And you may need to do that more than once because Apple, Google, Microsoft, and Intel will continue to release new fixes as new information about these flaws emerges. Furthermore, Intel struck out at the notion that these issues were limited to its chips, saying that AMD and ARM hardware are also vulnerable.

Recently some security researchers have revealed how a set of security flaws is letting hackers steal all the sensitive information from almost all modern computers and devices which use chips from Intel, AMD and ARM.

"System updates are made available by system manufacturers, operating system providers and others", Intel said.

The Verge says performance of Intel processors based on Skylake or newer architecture should not see a significant fall, but older processors might get slower.

Another, Spectre, could affect chips from many vendors, including Intel as well as AMD and Arm.

Earlier this week, reports emerged of Intel chips being prone to being hacked due to a flaw that went unnoticed for decades.

According to the investigators, the two vulnerabilities, dubbed Meltdown and Spectre, are present in all chips produced by Intel in the last 20 years, and are said to make the entire memory contents of computers accessible.

The world's biggest chipmakers and software companies, including Intel and Microsoft are wrestling with a vulnerability that exposes millions of computers and smartphones to hacking and performance slowdowns. But Intel's public statement on Wednesday indicated that the flaw isn't restricted to Intel's CPUs.

"Programmers are scrambling to overhaul the open-source Linux kernel's virtual memory system". Spectre on the other hand - which applies to nearly all computing devices - is harder to exploit but also less easily patched and will probably be a bigger problem long term, the Reuters report continues.

It believes these exploits do not have the potential to corrupt, modify or delete data, the company added. Google in their blogpost says that vulnerability can be exploited via three methods of attack and each will require their own dedicated solution.