This includes microcode from device OEMs and, in some cases, updates to antivirus software. To get all available protections, firmware (microcode) and software updates are required. We are working closely with industry partners including chip makers, hardware OEMs, and application vendors to protect customers. We have not yet received any information to indicate that these vulnerabilities were used to attack customers. See the following sections for more details. We have also taken action to secure our cloud services. We have released several updates to help mitigate these vulnerabilities. Therefore, we advise customers to seek guidance from those vendors. Note This issue also affects other operating systems, such as Android, Chrome, iOS, and macOS. Microsoft is aware of a new publicly disclosed class of vulnerabilities that are called “speculative execution side-channel attacks” and that affect many modern processors including Intel, AMD, VIA, and ARM. Please check back here regularly for updates and new FAQ. This article will be updated as additional information becomes available.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |