Intel have finally made an announcement https://newsroom.intel.com/news/intel-responds-to-security-research-findings/
Yes please ask him to. Ironically Handbrake is one of those applications that scale properly with cores, so AMD is already highly competitive there. Anyway, theoretically the biggest change in performance should be running VM software, a.k.a. AMD has been gifted a cargo ship of salt to rub in Intels wound once Epyc 2 marketing starts.
The "Don't panic!!! Don't panic!!! Captain Mannering..." approach In other news - AMD shares surge on report of an Intel chip security flaw
Windows 7 is in extended support, where it still gets security patches. Considering this is a giant security issue, Windows 7 should get the pach too.
Twas my initial thought. Let's put it this way I will be more surprised if there is one than if there is not. @fauguszten Yeah I hope that's the case
According to MS, Windows 10 will get an update for it at some point today, 7 and 8.1 on tuesday as part of the Patch Tuesday updates...
AMD have confirmed some of their wares are affected by one of the flaws found, but claim the risk is 'near zero'. So it's probably worth pointing out/reiterating it's not a flaw, it's flaws.
This appears to be the patch for windows 7 It's also up on WU, as are the patches for W10... not sure about 8.1...
The Inel CEO sold a shed load of shares he had to take him down to the 250,000 bare minimum he needs under his employment agreement before all this broke. Of course it was all 'pre-planned' on October 30th... http://www.businessinsider.com/inte...ny-was-informed-of-chip-flaw-2018-1?r=UK&IR=T Nothing to see here...
Pre-planned or not, they knew about it since June. Only having the bare minimum of shared you're contracted to hold is not a good endorsement of the company he runs.
Just finished an update piece which will be live in five or so minutes. TL;DL: There's two vulnerabilities: Meltdown, which is Intel-specific (so much for "it's not an Intel flaw," eh, Intel PR?) and Spectre which has been confirmed in part on Intel, AMD, and Arm Cortex-A family parts (but not Cortex-M.) Both are related to speculative execution. Linux and Windows are now patched, but the patch won't install on Windows unless your anti-virus has set a "this doesn't break me" flag in the registry - which means Windows Server users who don't have AV installed at all won't get the patch. Whoops! Android is patched as of the latest Google Security Release (which means probably 0.something percent of all devices have it), while macOS is partially patched with a full patch due in the next release. EDIT: Now live, and saying exactly what I just said above but in more words and with added "naughty naughty Brian Krzanich."
No, the original Project Zero report confirmed proof-of-concept exploitation on an Intel Xeon E5-1650 v3 (Haswell), AMD FX-8320, AMD Pro A8-9600 R7, and an ARM Cortex-A57 in a Nexus 5X smartphone. EDIT: Watch and marvel as someone uses Meltdown to steal passwords as they are typed. Whee!
Spectre is the biggy then, but harder to exploit. So much easier in the 8-bit days. So if I flick all my caps of my CPU i'm good to go