- Facebook is creating a meme feature to bring back the teens 12 Months Ago
- A hitman’s smartwatch helped send him to prison for life 12 Months Ago
- Privacy group files complaints against Netlifx, Spotify for GDPR violations Today 3:02 PM
- Bikini Kill reunion show sale proves the internet is still hell for live music fans Today 2:55 PM
- Teen’s photo of Nazi-themed school-dance invite goes viral Today 2:31 PM
- Ben Shapiro comes out as pro-baby Hitler in March for Life message Today 2:28 PM
- Facebook staffers caught writing 5-star Amazon reviews for Portal speaker Today 2:27 PM
- R. Kelly supporters are using #FirstThem to protect him Today 1:55 PM
- Lin-Manuel Miranda tweets his disappointment about Trump and Puerto Rico Today 1:28 PM
- YouTuber Simone Giertz reveals her brain tumor has returned Today 1:07 PM
- ‘Conversations With a Killer: The Ted Bundy Tapes’ feels like a bad one-man show Today 12:37 PM
- Post-cataclysmic sci-fi flick ‘IO’ fails to stand out in its saturated genre Today 12:30 PM
- Trump peddles right-wing ‘prayer rug’ conspiracy Today 11:29 AM
- Summit1G reportedly overtakes Ninja as king of Twitch subscribers Today 11:18 AM
- FCC’s request to postpone net neutrality case denied by federal court Today 11:02 AM
Report: Chinese companies learned of Intel chip flaws before U.S. government
Intel’s decision could have impacted the security of devices in the U.S.
Just after the new year, we learned of some significant Intel chip flaws that left computers and mobile devices vulnerable to two attacks known as Meltdown and Spectre. When Intel discovered the issue, the company may have made a critical misstep from a national security standpoint: It alerted Chinese customers and a small number of companies, including Chinese firms Alibaba and Lenovo, about its chip security issues before disclosing the vulnerability to the U.S. government, the Wall Street Journal reports.
In such a situation, it is OK for a company to reach out to customers first so that they’re able to develop patches and mitigate security concerns as quickly as possible before the news goes public. In this case, though, Intel’s original disclosure plans fell apart when news of the vulnerability leaked sooner than anticipated; the company wasn’t able to alert all of the companies it had originally planned.
“The Google Project Zero team and impacted vendors, including Intel, followed best practices of responsible and coordinated disclosure,” an Intel spokesperson said. “Standard and well-established practice on initial disclosure is to work with industry participants to develop solutions and deploy fixes ahead of publication. In this case, news of the exploit was reported ahead of the industry coalition’s intended public disclosure date at which point Intel immediately engaged the U.S. government and others.”
Some security researchers expressed concern that in alerting Chinese companies before the U.S. government, the Chinese government may have been able to exploit the security holes before patches were made widely available. At this point, there doesn’t seem to be evidence that the information was misused.
Intel currently faces several class-action lawsuits regarding Meltdown and Spectre, which affect nearly every desktop and mobile computing device on the planet. The suits allege Intel failed to fix the security flaws and failed to disclose the vulnerabilities in a timely fashion, and want compensation for the resulting slowed device performance anticipated in many devices. The chip flaw actually isn’t unique to Intel chips, though—it was also found in AMD, ARM, and other chip manufacturers’ products, too.
The best way to protect your devices and your data is to stay up to date with security updates. At this point, most OS makers, including Apple, Microsoft, and Google, have distributed patches to guard against most, if not all, of the threats posed by Spectre and Meltdown.
Christina Bonnington is a tech reporter who specializes in consumer gadgets, apps, and the trends shaping the technology industry. Her work has also appeared in Gizmodo, Wired, Refinery29, Slate, Bicycling, and Outside Magazine. She is based in the San Francisco Bay Area and has a background in electrical engineering.